Server Component Details | Group: io.mosip.pms ---- Artifact: partner-management-service ---- version: 1.2.2.2 ---- Commit ID: 3aa0c89 Group: io.mosip.pms ---- Artifact: policy-management-service ---- version: 1.2.2.2 ---- Commit ID: 3aa0c89 | End Points used |
Domain: esignet-mock.esqa2.mosip.net ---- Module: esignet ---- End Point: v1/esignet/linked-authorization/link-code
Domain: esignet-mock.esqa2.mosip.net ---- Module: esignet ---- End Point: v1/esignet/linked-authorization/link-transaction
Domain: esignet-mock.esqa2.mosip.net ---- Module: esignet ---- End Point: v1/esignet/oidc/userinfo
Domain: esignet-mock.esqa2.mosip.net ---- Module: esignet ---- End Point: v1/esignet/linked-authorization/link-status
Domain: esignet-mock.esqa2.mosip.net ---- Module: esignet ---- End Point: v1/esignet/actuator/env
Domain: esignet-mock.esqa2.mosip.net ---- Module: esignet ---- End Point: v1/esignet/oauth/par
Domain: esignet-mock.esqa2.mosip.net ---- Module: esignet ---- End Point: v1/esignet/binding/wallet-binding
Domain: esignet-mock.esqa2.mosip.net ---- Module: esignet ---- End Point: v1/esignet/client-mgmt/oauth-client
Domain: esignet-mock.esqa2.mosip.net ---- Module: esignet ---- End Point: v1/esignet/linked-authorization/authenticate
Domain: esignet-mock.esqa2.mosip.net ---- Module: esignet ---- End Point: v1/esignet/authorization/v3/oauth-details
Domain: esignet-mock.esqa2.mosip.net ---- Module: esignet ---- End Point: v1/esignet/binding/binding-otp
Domain: esignet-mock.esqa2.mosip.net ---- Module: esignet ---- End Point: v1/esignet/client-mgmt/client/{clientId}
Domain: esignet-mock.esqa2.mosip.net ---- Module: esignet ---- End Point: v1/esignet/authorization/v3/authenticate
Domain: esignet-mock.esqa2.mosip.net ---- Module: esignet ---- End Point: v1/esignet/authorization/v2/authenticate
Domain: esignet-mock.esqa2.mosip.net ---- Module: esignet ---- End Point: v1/esignet/authorization/par-oauth-details
Domain: esignet-mock.esqa2.mosip.net ---- Module: esignet ---- End Point: v1/esignet/client-mgmt/client
Domain: api.esqa2.mosip.net ---- Module: mock-identity-system ---- End Point: v1/mock-identity-system/identity
Domain: esignet-mock.esqa2.mosip.net ---- Module: esignet ---- End Point: v1/esignet/authorization/send-otp
Domain: esignet-mock.esqa2.mosip.net ---- Module: esignet ---- End Point: v1/esignet/oidc/.well-known/openid-configuration
Domain: esignet-mock.esqa2.mosip.net ---- Module: esignet ---- End Point: v1/esignet/linked-authorization/consent
Domain: esignet-mock.esqa2.mosip.net ---- Module: esignet ---- End Point: v1/esignet/client-mgmt/oidc-client/{clientId}
Domain: esignet-mock.esqa2.mosip.net ---- Module: esignet ---- End Point: v1/esignet/linked-authorization/link-auth-code
Domain: esignet-mock.esqa2.mosip.net ---- Module: esignet ---- End Point: v1/esignet/linked-authorization/v2/consent
Domain: esignet-mock.esqa2.mosip.net ---- Module: esignet ---- End Point: v1/esignet/authorization/oauth-details
Domain: esignet-mock.esqa2.mosip.net ---- Module: esignet ---- End Point: v1/esignet/authorization/auth-code
Domain: esignet-mock.esqa2.mosip.net ---- Module: esignet ---- End Point: v1/esignet/authorization/v2/oauth-details
Domain: esignet-mock.esqa2.mosip.net ---- Module: esignet ---- End Point: v1/esignet/authorization/authenticate
Domain: esignet-mock.esqa2.mosip.net ---- Module: esignet ---- End Point: v1/esignet/client-mgmt/oidc-client
Domain: api-internal.esqa2.mosip.net ---- Module: authmanager ---- End Point: v1/authmanager/authenticate/clientidsecretkey
Domain: esignet-mock.esqa2.mosip.net ---- Module: esignet ---- End Point: v1/esignet/client-mgmt/oauth-client/{clientId}
Domain: esignet-mock.esqa2.mosip.net ---- Module: esignet ---- End Point: v1/esignet/linked-authorization/v2/authenticate
Domain: esignet-mock.esqa2.mosip.net ---- Module: esignet ---- End Point: v1/esignet/oauth/v2/token | |||||
|---|---|---|---|---|---|---|---|---|
Server Errors No server errors | ||||||||
Captcha Enabled false | ||||||||
| eSignet Pre-requisite API Test ---- Report Date: 2025-11-27 ---- Tested Environment: esqa2 ---- Commit Id is: 1cbf531d & Branch Name is:release-1.7.x | ||||||||
| Test Scenario | # Total | # Passed | # Skipped | # Failed | # Ignored | # Known_Issues | Execution Time (HH:MM:SS) | |
| AddIdentityMock | 46 | 45 | 0 | 0 | 1 | 0 | 00:00:03 | |
| AddIdentity | 46 | 0 | 0 | 0 | 46 | 0 | 00:00:01 | |
| CreatePolicyGroup | 4 | 0 | 0 | 0 | 4 | 0 | 00:00:01 | |
| DefinePolicy | 15 | 0 | 0 | 0 | 15 | 0 | 00:00:01 | |
| PublishPolicy | 8 | 0 | 0 | 0 | 8 | 0 | 00:00:01 | |
| CreatePartner | 8 | 0 | 0 | 0 | 8 | 0 | 00:00:01 | |
| UploadCACertificate | 16 | 0 | 0 | 0 | 16 | 0 | 00:00:01 | |
| UploadPartnerCertificate | 8 | 0 | 0 | 0 | 8 | 0 | 00:00:01 | |
| updatePartnerCertificate | 1 | 0 | 0 | 0 | 1 | 0 | 00:00:01 | |
| RequestAPIKeyForAuthPartner | 6 | 0 | 0 | 0 | 6 | 0 | 00:00:01 | |
| ApproveAPIKey | 6 | 0 | 0 | 0 | 6 | 0 | 00:00:01 | |
| UpdatePolicy | 1 | 0 | 0 | 0 | 1 | 0 | 00:00:01 | |
| DeactivatePolicy | 1 | 0 | 0 | 0 | 1 | 0 | 00:00:01 | |
| GenerateMispLK | 3 | 0 | 0 | 0 | 3 | 0 | 00:00:01 | |
| GenerateApiKey | 2 | 0 | 0 | 0 | 2 | 0 | 00:00:01 | |
| OIDCClient | 27 | 0 | 0 | 0 | 27 | 0 | 00:00:01 | |
| OIDCClientUpdate | 2 | 0 | 0 | 0 | 2 | 0 | 00:00:01 | |
| GetOidcClient | 2 | 0 | 0 | 0 | 2 | 0 | 00:00:01 | |
| GenerateVID | 16 | 0 | 0 | 0 | 16 | 0 | 00:00:01 | |
| eSignet API Test ---- Report Date: 2025-11-27 ---- Tested Environment: esqa2 ---- Commit Id is: 1cbf531d & Branch Name is:release-1.7.x | ||||||||
| Test Scenario | # Total | # Passed | # Skipped | # Failed | # Ignored | # Known_Issues | Execution Time (HH:MM:SS) | |
| OIDCClientV2 | 3 | 3 | 0 | 0 | 0 | 0 | 00:00:04 | |
| SendBindingOtp | 32 | 17 | 0 | 0 | 15 | 0 | 00:00:03 | |
| WalletBinding | 64 | 33 | 0 | 0 | 31 | 0 | 00:00:12 | |
| OAuthDetailsRequestLinkedConsent | 11 | 11 | 0 | 0 | 0 | 0 | 00:00:02 | |
| GenerateLinkCodeConsent | 10 | 9 | 0 | 0 | 1 | 0 | 00:00:01 | |
| LinkTransactionConsent | 10 | 9 | 0 | 0 | 1 | 0 | 00:00:02 | |
| GetLinkStatusConsent | 10 | 9 | 0 | 0 | 1 | 0 | 00:00:01 | |
| LinkedAuthenticationConsentWla | 10 | 9 | 0 | 0 | 1 | 0 | 00:00:05 | |
| LinkAuthorizationConsent | 9 | 8 | 0 | 0 | 1 | 0 | 00:00:01 | |
| LinkAuthorizationCodeConsent | 2 | 1 | 0 | 0 | 1 | 0 | 00:00:01 | |
| GenerateTokenLinkedConsent | 2 | 1 | 0 | 0 | 1 | 0 | 00:00:01 | |
| GetOidcUserInfoLinkedConsent | 2 | 1 | 0 | 0 | 1 | 0 | 00:00:01 | |
| OAuthDetailsRequestLinked | 14 | 11 | 0 | 0 | 3 | 0 | 00:00:01 | |
| GenerateLinkCode | 23 | 20 | 0 | 0 | 3 | 0 | 00:00:01 | |
| LinkTransaction | 24 | 21 | 0 | 0 | 3 | 0 | 00:00:01 | |
| GetLinkStatus | 23 | 20 | 0 | 0 | 3 | 0 | 00:00:01 | |
| LinkedAuthenticationWla | 13 | 10 | 0 | 0 | 3 | 0 | 00:00:05 | |
| LinkedAuthorizationConsent | 26 | 23 | 0 | 0 | 3 | 0 | 00:00:01 | |
| LinkAuthorizationCode | 19 | 16 | 0 | 0 | 3 | 0 | 00:00:01 | |
| GenerateTokenLinked | 6 | 3 | 0 | 0 | 3 | 0 | 00:00:01 | |
| GetOidcUserInfoLinked | 6 | 3 | 0 | 0 | 3 | 0 | 00:00:01 | |
| OAuthDetailsRequestNonAuth | 26 | 13 | 0 | 0 | 13 | 0 | 00:00:01 | |
| BioNonAuth | 24 | 0 | 0 | 0 | 24 | 0 | 00:00:01 | |
| AuthenticateUserNonAuth | 2 | 0 | 0 | 0 | 2 | 0 | 00:00:01 | |
| OAuthDetailsRequestConsent | 10 | 7 | 0 | 0 | 3 | 0 | 00:00:01 | |
| AuthenticateUserConsent | 13 | 8 | 0 | 0 | 5 | 0 | 00:00:02 | |
| AuthorizationCodeConsent | 11 | 9 | 0 | 0 | 2 | 0 | 00:00:01 | |
| GenerateTokenConsent | 4 | 2 | 0 | 0 | 2 | 0 | 00:00:01 | |
| GetOidcUserInfoConsent | 4 | 2 | 0 | 0 | 2 | 0 | 00:00:01 | |
| OAuthDetailsRequest | 87 | 84 | 0 | 0 | 3 | 0 | 00:00:06 | |
| BioAuthIdp | 24 | 0 | 0 | 0 | 24 | 0 | 00:00:01 | |
| SendOtp | 44 | 23 | 0 | 0 | 21 | 0 | 00:00:01 | |
| AuthenticateUser | 57 | 30 | 0 | 0 | 27 | 0 | 00:00:05 | |
| AuthorizationCode | 37 | 21 | 0 | 0 | 16 | 0 | 00:00:01 | |
| GenerateToken | 62 | 31 | 0 | 0 | 31 | 0 | 00:00:03 | |
| GetOidcUserInfo | 4 | 2 | 0 | 0 | 2 | 0 | 00:00:01 | |
| CreateOIDCClient | 32 | 31 | 0 | 0 | 1 | 0 | 00:00:06 | |
| UpdateOIDCClient | 29 | 28 | 0 | 0 | 1 | 0 | 00:00:02 | |
| CreateOIDCClientV2 | 6 | 6 | 0 | 0 | 0 | 0 | 00:00:01 | |
| UpdateOIDCClientV2 | 6 | 6 | 0 | 0 | 0 | 0 | 00:00:01 | |
| OAuthDetailsRequestV2 | 2 | 2 | 0 | 0 | 0 | 0 | 00:00:01 | |
| CreatePolicySunBirdR | 1 | 0 | 0 | 0 | 1 | 0 | 00:00:01 | |
| GetPolicySunBirdR | 1 | 0 | 0 | 0 | 1 | 0 | 00:00:01 | |
| SearchPolicySunBirdR | 1 | 0 | 0 | 0 | 1 | 0 | 00:00:01 | |
| CreateOIDCClientV2SunBirdC | 1 | 0 | 0 | 0 | 1 | 0 | 00:00:01 | |
| OAuthDetailsRequestSunBirdC | 1 | 0 | 0 | 0 | 1 | 0 | 00:00:01 | |
| AuthenticateUserSunBirdC | 1 | 0 | 0 | 0 | 1 | 0 | 00:00:01 | |
| AuthorizationCodeSunBirdC | 1 | 0 | 0 | 0 | 1 | 0 | 00:00:01 | |
| GenerateTokenSunBirdC | 1 | 0 | 0 | 0 | 1 | 0 | 00:00:01 | |
| OAuthDetailsRequestSunBirdCNegTC | 28 | 0 | 0 | 0 | 28 | 0 | 00:00:01 | |
| AuthenticateUserSunBirdCNegTC | 41 | 0 | 0 | 0 | 41 | 0 | 00:00:01 | |
| AuthorizationCodeSunBirdCNegTC | 9 | 0 | 0 | 0 | 9 | 0 | 00:00:01 | |
| GenerateTokenSunBirdCNegTC | 6 | 0 | 0 | 0 | 6 | 0 | 00:00:01 | |
| DeletePolicySunBirdR | 1 | 0 | 0 | 0 | 1 | 0 | 00:00:01 | |
| CreateOIDCClientV3 | 25 | 25 | 0 | 0 | 0 | 0 | 00:00:05 | |
| CreateOIDCClientV3PublicKeyNegSce | 3 | 3 | 0 | 0 | 0 | 0 | 00:00:01 | |
| UpdateOIDCClientV3 | 28 | 28 | 0 | 0 | 0 | 0 | 00:00:02 | |
| UpdateClientV3IDA | 3 | 0 | 0 | 0 | 3 | 0 | 00:00:01 | |
| OAuthDetailsRequestV3IDA | 3 | 0 | 0 | 0 | 3 | 0 | 00:00:01 | |
| AuthenticateUserV3IDA | 3 | 0 | 0 | 0 | 3 | 0 | 00:00:01 | |
| AuthorizeCodeIDA | 3 | 0 | 0 | 0 | 3 | 0 | 00:00:01 | |
| GenerateTokenV2IDA | 3 | 0 | 0 | 0 | 3 | 0 | 00:00:01 | |
| UserInfoIDA | 3 | 0 | 0 | 0 | 3 | 0 | 00:00:01 | |
| OIDCClientV3MOCK | 3 | 3 | 0 | 0 | 0 | 0 | 00:00:01 | |
| UpdateClientV3MOCK | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:01 | |
| OAuthDetailsRequestV3MOCK | 3 | 3 | 0 | 0 | 0 | 0 | 00:00:01 | |
| AuthenticateUserV3MOCK | 3 | 3 | 0 | 0 | 0 | 0 | 00:00:01 | |
| AuthorizeCodeMOCK | 3 | 3 | 0 | 0 | 0 | 0 | 00:00:01 | |
| GenerateTokenV2MOCK | 3 | 3 | 0 | 0 | 0 | 0 | 00:00:01 | |
| UserInfoMOCK | 3 | 3 | 0 | 0 | 0 | 0 | 00:00:01 | |
| PARCreateOIDCClientV3 | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:01 | |
| OauthPAR | 6 | 6 | 0 | 0 | 0 | 0 | 00:00:01 | |
| PAROauthDetails | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:01 | |
| PARAuthenticateUserV3 | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:01 | |
| PARAuthorizationCode | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:01 | |
| PARGenerateToken | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:01 | |
| PARGetUserInfo | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:01 | |
| OauthPARNegativeScenarios | 16 | 16 | 0 | 0 | 0 | 0 | 00:00:01 | |
| PAROauthDetailsNegativeScenarios | 6 | 6 | 0 | 0 | 0 | 0 | 00:00:01 | |
| DPoPCreateOIDCClientV3 | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:01 | |
| OauthDPoP | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:01 | |
| DPoPOauthDetails | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:01 | |
| DPoPAuthenticateUserV3 | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:01 | |
| DPoPAuthorizationCode | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:01 | |
| DPoPGenerateToken | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:01 | |
| DPoPGetUserInfo | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:01 | |
| OauthDPoPNegativeScenarios | 4 | 4 | 0 | 0 | 0 | 0 | 00:00:01 | |
| DPoPGenerateTokenNegativeScenarios | 2 | 2 | 0 | 0 | 0 | 0 | 00:00:01 | |
| DPoPOauthDetailsNegativeScenarios | 7 | 7 | 0 | 0 | 0 | 0 | 00:00:01 | |
| OIDCClientV3VerifiedClaims | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:01 | |
| OAuthDetailsRequestV3VerifiedClaims | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:01 | |
| AuthenticateUserV3VerifiedClaims | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:01 | |
| AuthorizeCodeVerifiedClaims | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:01 | |
| GenerateTokenV2VerifiedClaims | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:01 | |
| UserInfoVerifiedClaims | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:01 | |
| OIDCClientV3WithoutVerifiedClaims | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:01 | |
| OAuthDetailsRequestV3WithoutVerifiedClaims | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:01 | |
| AuthenticateUserV3WithoutVerifiedClaims | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:01 | |
| AuthorizeCodeWithoutVerifiedClaims | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:01 | |
| GenerateTokenV2WithoutVerifiedClaims | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:01 | |
| UserInfoWithoutVerifiedClaims | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:01 | |
| Total | 1,273 | 729 | 0 | 0 | 544 | 0 | 00:01:46 | |
| TestCase Number | TestCase Description | Execution Time (HH:MM:SS) |
|---|---|---|
| AddIdentityMock — Ignored | ||
| Dependent_Idrepo_AddIdentity_14 | Add identity with BioAuth | 00:00:01 |
| AddIdentityMock — Passed | ||
| Dependent_Idrepo_AddIdentity_17 | Add identity consent Vid | 00:00:01 |
| Dependent_Idrepo_AddIdentity_16 | Add identity consent | 00:00:01 |
| Dependent_Idrepo_AddIdentity_44 | Add identity with all valid parameters for DPOP Smoke test cases | 00:00:01 |
| Dependent_Idrepo_AddIdentity_45 | Add identity with all valid parameters for PAR Smoke test cases | 00:00:01 |
| Dependent_Idrepo_AddIdentity_46 | Add identity with all valid parameters for DPOP Smoke test cases | 00:00:01 |
| Dependent_Idrepo_AddIdentity_43 | Add identity with all valid parameters for PAR Smoke test cases | 00:00:01 |
| Dependent_Idrepo_AddIdentity_03 | Add identity with invalid scenario | 00:00:01 |
| Dependent_Idrepo_AddIdentity_15 | Add identity with KycAuth | 00:00:01 |
| Dependent_Idrepo_AddIdentity_39 | Add identity for linked consent | 00:00:01 |
| Dependent_Idrepo_AddIdentity_38 | Add identity for linked consent | 00:00:01 |
| Dependent_Idrepo_AddIdentity_37 | Add identity for linked consent | 00:00:01 |
| Dependent_Idrepo_AddIdentity_28 | Add identity for v3 end to end flow | 00:00:01 |
| Dependent_Idrepo_AddIdentity_42 | Add identity for linked consent | 00:00:01 |
| Dependent_Idrepo_AddIdentity_40 | Add identity for linked consent | 00:00:01 |
| Dependent_Idrepo_AddIdentity_36 | Add identity for linked consent | 00:00:01 |
| Dependent_Idrepo_AddIdentity_41 | Add identity for linked consent | 00:00:01 |
| Dependent_Idrepo_AddIdentity_26 | Add identity for v3 end to end flow | 00:00:01 |
| Dependent_Idrepo_AddIdentity_27 | Add identity for v3 end to end flow | 00:00:01 |
| Dependent_Idrepo_AddIdentity_25 | Add identity for v3 end to end flow | 00:00:01 |
| Dependent_Idrepo_AddIdentity_29 | Add identity for linked consent | 00:00:01 |
| Dependent_Idrepo_AddIdentity_30 | Add identity for linked consent | 00:00:01 |
| Dependent_Idrepo_AddIdentity_31 | Add identity for linked consent | 00:00:01 |
| Dependent_Idrepo_AddIdentity_34 | Add identity for linked consent | 00:00:01 |
| Dependent_Idrepo_AddIdentity_33 | Add identity for linked consent | 00:00:01 |
| Dependent_Idrepo_AddIdentity_35 | Add identity for linked consent | 00:00:01 |
| Dependent_Idrepo_AddIdentity_32 | Add identity for linked consent | 00:00:01 |
| Dependent_Idrepo_AddIdentity_24 | Add identity with password authentication | 00:00:01 |
| Dependent_Idrepo_AddIdentity_23 | Add identity with password authentication | 00:00:01 |
| Dependent_Idrepo_AddIdentity_13 | Add identity linked consent user2 Vid | 00:00:01 |
| Dependent_Idrepo_AddIdentity_11 | Add identity linked consent user2 | 00:00:01 |
| Dependent_Idrepo_AddIdentity_12 | Add identity linked consent Vid | 00:00:01 |
| Dependent_Idrepo_AddIdentity_10 | Add identity linked consent | 00:00:01 |
| Dependent_Idrepo_AddIdentity_09 | Add identity with valid parameters | 00:00:01 |
| Dependent_Idrepo_AddIdentity_22 | Add identity with password authentication | 00:00:01 |
| Dependent_Idrepo_AddIdentity_02 | Add identity with all valid parameters | 00:00:01 |
| Dependent_Idrepo_AddIdentity_01 | Add identity with all valid parameters | 00:00:01 |
| Dependent_Idrepo_AddIdentity_04 | Add identity with all valid parameters | 00:00:01 |
| Dependent_Idrepo_AddIdentity_21 | Add identity with valid parameters VCI Vid invalid scenario | 00:00:01 |
| Dependent_Idrepo_AddIdentity_20 | Add identity with valid parameters VCI Vid | 00:00:01 |
| Dependent_Idrepo_AddIdentity_19 | Add identity with valid parameters VCI UIN invalid scenario | 00:00:01 |
| Dependent_Idrepo_AddIdentity_18 | Add identity with valid parameters VCI UIN | 00:00:01 |
| Dependent_Idrepo_AddIdentity_06 | Add identity with valid parameter and without Email | 00:00:01 |
| Dependent_Idrepo_AddIdentity_05 | Add identity with valid parameter and without phone number | 00:00:01 |
| Dependent_Idrepo_AddIdentity_08 | Add identity Vid generation | 00:00:01 |
| Dependent_Idrepo_AddIdentity_07 | Add identity Vid generation | 00:00:01 |
| AddIdentity — Ignored | ||
| Dependent_Idrepo_AddIdentity_14 | Add identity with BioAuth | 00:00:00 |
| Dependent_Idrepo_AddIdentity_17 | Add identity consent Vid | 00:00:01 |
| Dependent_Idrepo_AddIdentity_16 | Add identity consent | 00:00:00 |
| Dependent_Idrepo_AddIdentity_44 | Add identity with all valid parameters for DPOP Smoke test cases | 00:00:00 |
| Dependent_Idrepo_AddIdentity_45 | Add identity with all valid parameters for OTP Flow Verified Claims | 00:00:00 |
| Dependent_Idrepo_AddIdentity_46 | Add identity with all valid parameters for OTP Flow Without Verified Claims | 00:00:00 |
| Dependent_Idrepo_AddIdentity_43 | Add identity with all valid parameters for PAR Smoke test cases | 00:00:00 |
| Dependent_Idrepo_AddIdentity_03 | Add identity with invalid scenario | 00:00:01 |
| Dependent_Idrepo_AddIdentity_15 | Add identity with KycAuth | 00:00:00 |
| Dependent_Idrepo_AddIdentity_39 | Add identity with all valid parameters | 00:00:00 |
| Dependent_Idrepo_AddIdentity_38 | Add identity with all valid parameters | 00:00:00 |
| Dependent_Idrepo_AddIdentity_37 | Add identity with all valid parameters | 00:00:01 |
| Dependent_Idrepo_AddIdentity_28 | Add identity with all valid parameters | 00:00:00 |
| Dependent_Idrepo_AddIdentity_42 | Add identity with all valid parameters | 00:00:00 |
| Dependent_Idrepo_AddIdentity_40 | Add identity with all valid parameters | 00:00:00 |
| Dependent_Idrepo_AddIdentity_36 | Add identity with all valid parameters | 00:00:00 |
| Dependent_Idrepo_AddIdentity_41 | Add identity with all valid parameters | 00:00:00 |
| Dependent_Idrepo_AddIdentity_26 | Add identity with all valid parameters | 00:00:00 |
| Dependent_Idrepo_AddIdentity_27 | Add identity with all valid parameters | 00:00:00 |
| Dependent_Idrepo_AddIdentity_25 | Add identity with all valid parameters | 00:00:00 |
| Dependent_Idrepo_AddIdentity_29 | Add identity with all valid parameters | 00:00:00 |
| Dependent_Idrepo_AddIdentity_30 | Add identity with all valid parameters | 00:00:00 |
| Dependent_Idrepo_AddIdentity_31 | Add identity with all valid parameters | 00:00:00 |
| Dependent_Idrepo_AddIdentity_34 | Add identity with all valid parameters | 00:00:01 |
| Dependent_Idrepo_AddIdentity_33 | Add identity with all valid parameters | 00:00:00 |
| Dependent_Idrepo_AddIdentity_35 | Add identity with all valid parameters | 00:00:00 |
| Dependent_Idrepo_AddIdentity_32 | Add identity with all valid parameters | 00:00:00 |
| Dependent_Idrepo_AddIdentity_24 | Add identity with all valid parameters | 00:00:00 |
| Dependent_Idrepo_AddIdentity_23 | Add identity with all valid parameters | 00:00:00 |
| Dependent_Idrepo_AddIdentity_13 | Add identity linked consent user2 Vid | 00:00:00 |
| Dependent_Idrepo_AddIdentity_11 | Add identity linked consent user2 | 00:00:00 |
| Dependent_Idrepo_AddIdentity_12 | Add identity linked consent Vid | 00:00:00 |
| Dependent_Idrepo_AddIdentity_10 | Add identity linked consent | 00:00:00 |
| Dependent_Idrepo_AddIdentity_09 | Add identity with valid parameters | 00:00:00 |
| Dependent_Idrepo_AddIdentity_22 | Add identity with password authentication | 00:00:00 |
| Dependent_Idrepo_AddIdentity_02 | Add identity with all valid parameters | 00:00:00 |
| Dependent_Idrepo_AddIdentity_01 | Add identity with all valid parameters | 00:00:00 |
| Dependent_Idrepo_AddIdentity_04 | Add identity with all valid parameters | 00:00:00 |
| Dependent_Idrepo_AddIdentity_21 | Add identity with valid parameters VCI Vid invalid scenario | 00:00:00 |
| Dependent_Idrepo_AddIdentity_20 | Add identity with valid parameters VCI Vid | 00:00:00 |
| Dependent_Idrepo_AddIdentity_19 | Add identity with valid parameters VCI UIN invalid scenario | 00:00:00 |
| Dependent_Idrepo_AddIdentity_18 | Add identity with valid parameters VCI UIN | 00:00:00 |
| Dependent_Idrepo_AddIdentity_06 | Add identity with valid parameter and without Email | 00:00:00 |
| Dependent_Idrepo_AddIdentity_05 | Add identity with valid parameter and without phone number | 00:00:00 |
| Dependent_Idrepo_AddIdentity_08 | Add identity Vid generation | 00:00:00 |
| Dependent_Idrepo_AddIdentity_07 | Add identity Vid generation | 00:00:00 |
| CreatePolicyGroup — Ignored | ||
| Dependent_Idrepo_definePolicyGroup_01 | Define policy group with all valid parameters | 00:00:01 |
| Dependent_Idrepo_definePolicyGroup_02 | Define policy group with valid Misp | 00:00:00 |
| Dependent_Idrepo_definePolicyGroup_04 | Define policy group with valid details | 00:00:00 |
| Dependent_Idrepo_definePolicyGroup_03 | Define policy group with valid details | 00:00:00 |
| DefinePolicy — Ignored | ||
| Dependent_Idrepo_definePolicy_01 | Define policy with all valid details | 00:00:01 |
| Dependent_Idrepo_definePolicy_13 | Define policy with Auth and isActive as false | 00:00:00 |
| Dependent_Idrepo_definePolicy_15 | Define policy with Auth S2 | 00:00:00 |
| Dependent_Idrepo_definePolicy_03 | Define policy with Auth | 00:00:00 |
| Dependent_Idrepo_definePolicy_10 | Define policy with invalid MispPolicy | 00:00:00 |
| Dependent_Idrepo_definePolicy_09 | Define policy with invalid policyAuth | 00:00:00 |
| Dependent_Idrepo_definePolicy_08 | Define policy with invalid policyGroupName | 00:00:00 |
| Dependent_Idrepo_definePolicy_07 | Define policy with invalid policyType | 00:00:00 |
| Dependent_Idrepo_definePolicy_12 | Define policy with isActive as false | 00:00:00 |
| Dependent_Idrepo_definePolicy_14 | Define policy with Misp S2 | 00:00:00 |
| Dependent_Idrepo_definePolicy_02 | Define policy with all valid details Misp | 00:00:01 |
| Dependent_Idrepo_definePolicy_04 | Define policy with NonAuth | 00:00:00 |
| Dependent_Idrepo_definePolicy_05 | Define policy with 1 policy valid details | 00:00:00 |
| Dependent_Idrepo_definePolicy_06 | Define policy with 2 policy valid details | 00:00:00 |
| Dependent_Idrepo_definePolicy_11 | Define policy with invalid Misp Name | 00:00:00 |
| PublishPolicy — Ignored | ||
| Dependent_Idrepo_createPublishPolicy_01 | Publish policy with all valid details | 00:00:00 |
| Dependent_Idrepo_createPublishPolicy_06 | Publish policy Auth false valid details | 00:00:00 |
| Dependent_Idrepo_createPublishPolicy_08 | Publish policy Auth S2 valid details | 00:00:00 |
| Dependent_Idrepo_createPublishPolicy_05 | Publish policy Misp false valid details | 00:00:00 |
| Dependent_Idrepo_createPublishPolicy_07 | Publish policy Misp S2 valid details | 00:00:00 |
| Dependent_Idrepo_createPublishPolicy_02 | Publish policy Misp with all valid details | 00:00:01 |
| Dependent_Idrepo_createPublishPolicy_04 | Publish policy with NonAuth valid details | 00:00:00 |
| Dependent_Idrepo_createPublishPolicy_03 | Publish policy with valid details | 00:00:00 |
| CreatePartner — Ignored | ||
| Dependent_Idrepo_createPartnerSelfRegistration_01 | PartnerSelfRegistration with all valid details | 00:00:00 |
| Dependent_Idrepo_createPartnerSelfRegistration_06 | PartnerSelfRegistration Auth false valid details | 00:00:00 |
| Dependent_Idrepo_createPartnerSelfRegistration_08 | PartnerSelfRegistration Auth S2 valid details | 00:00:00 |
| Dependent_Idrepo_createPartnerSelfRegistration_03 | PartnerSelfRegistration Kyc valid details | 00:00:01 |
| Dependent_Idrepo_createPartnerSelfRegistration_05 | PartnerSelfRegistration Misp false valid details | 00:00:00 |
| Dependent_Idrepo_createPartnerSelfRegistration_07 | PartnerSelfRegistration Misp S2 valid details | 00:00:00 |
| Dependent_Idrepo_createPartnerSelfRegistration_02 | PartnerSelfRegistration Misp valid details | 00:00:01 |
| Dependent_Idrepo_createPartnerSelfRegistration_04 | PartnerSelfRegistration NonAuth all valid details | 00:00:00 |
| UploadCACertificate — Ignored | ||
| Dependent_Idrepo_uploadCACert_01 | upload CACertificate with all valid details | 00:00:00 |
| Dependent_Idrepo_uploadCACert_11 | upload CACertificate Auth false valid details | 00:00:00 |
| Dependent_Idrepo_uploadCACert_15 | upload CACertificate Auth S2 valid details | 00:00:00 |
| Dependent_Idrepo_uploadCACert_05 | upload CACertificate Kyc with all valid details | 00:00:00 |
| Dependent_Idrepo_uploadCACert_09 | upload CACertificate Misp False valid details | 00:00:00 |
| Dependent_Idrepo_uploadCACert_13 | upload CACertificate Misp S2 valid details | 00:00:00 |
| Dependent_Idrepo_uploadCACert_03 | upload CACertificate Misp valid details | 00:00:01 |
| Dependent_Idrepo_uploadCACert_07 | upload CACertificate NonAuth with all valid details | 00:00:00 |
| Dependent_Idrepo_uploadCACert_02 | upload CACertificate with all valid details | 00:00:01 |
| Dependent_Idrepo_uploadCACert_12 | upload CACertificate Auth false valid details | 00:00:00 |
| Dependent_Idrepo_uploadCACert_16 | upload CACertificate Auth S2 valid details | 00:00:01 |
| Dependent_Idrepo_uploadCACert_06 | upload CACertificate Kyc with all valid details | 00:00:01 |
| Dependent_Idrepo_uploadCACert_10 | upload CACertificate Misp false valid details | 00:00:00 |
| Dependent_Idrepo_uploadCACert_14 | upload CACertificate Misp S2 valid details | 00:00:00 |
| Dependent_Idrepo_uploadCACert_04 | upload CACertificate Misp valid details | 00:00:00 |
| Dependent_Idrepo_uploadCACert_08 | upload CACertificate NonAuth all valid details | 00:00:00 |
| UploadPartnerCertificate — Ignored | ||
| Dependent_Idrepo_uploadPartnerCert_01 | Upload partner certificate with all valid details | 00:00:00 |
| Dependent_Idrepo_uploadPartnerCert_06 | Upload partner certificate Auth false valid details | 00:00:00 |
| Dependent_Idrepo_uploadPartnerCert_08 | Upload partner certificate Auth S2 valid details | 00:00:00 |
| Dependent_Idrepo_uploadPartnerCert_03 | Upload partner certificate Kyc all valid details | 00:00:00 |
| Dependent_Idrepo_uploadPartnerCert_05 | Upload partner certificate Misp false valid details | 00:00:00 |
| Dependent_Idrepo_uploadPartnerCert_07 | Upload partner certificate Misp S2 valid details | 00:00:00 |
| Dependent_Idrepo_uploadPartnerCert_02 | Upload partner certificate Misp valid details | 00:00:00 |
| Dependent_Idrepo_uploadPartnerCert_04 | Upload partner certificate NonAuth all valid details | 00:00:01 |
| updatePartnerCertificate — Ignored | ||
| Dependent_Idrepo_updatePartnerCertificate_01 | Update partner certificate statusCode AuthDemoUrl all valid details | 00:00:00 |
| RequestAPIKeyForAuthPartner — Ignored | ||
| Dependent_Idrepo_RequestAPIKeyForAuthPartner_03 | Submit partner Api Key request Kyc rejection all valid details | 00:00:00 |
| Dependent_Idrepo_RequestAPIKeyForAuthPartner_01 | Submit partner Api Key request rejection all valid details | 00:00:01 |
| Dependent_Idrepo_RequestAPIKeyForAuthPartner_06 | Submit partner Api Key request rejection Auth false valid details | 00:00:01 |
| Dependent_Idrepo_RequestAPIKeyForAuthPartner_05 | Submit partner Api Key request rejection Misp false valid details | 00:00:00 |
| Dependent_Idrepo_RequestAPIKeyForAuthPartner_02 | Submit partner Api Key request rejection Misp valid details | 00:00:00 |
| Dependent_Idrepo_RequestAPIKeyForAuthPartner_04 | Submit partner Api Key request rejection NonAuth all valid details | 00:00:00 |
| ApproveAPIKey — Ignored | ||
| Dependent_Idrepo_ApproveAPIKey_01 | Approve or Reject partner Api key request all valid details | 00:00:00 |
| Dependent_Idrepo_ApproveAPIKey_06 | Approve or Reject partner Api key request Auth false valid details | 00:00:00 |
| Dependent_Idrepo_ApproveAPIKey_03 | Approve or Reject partner Api key request Kyc all valid details | 00:00:01 |
| Dependent_Idrepo_ApproveAPIKey_05 | Approve or Reject partner Api key request Misp false valid details | 00:00:00 |
| Dependent_Idrepo_ApproveAPIKey_02 | Approve or Reject partner Api key request Misp valid details | 00:00:00 |
| Dependent_Idrepo_ApproveAPIKey_04 | Approve or Reject partner Api key request NonAuth all valid details | 00:00:01 |
| UpdatePolicy — Ignored | ||
| Dependent_Idrepo_UpdatePolicy_01 | Update policy after published | 00:00:01 |
| DeactivatePolicy — Ignored | ||
| Dependent_Idrepo_DeactivatePolicy_01 | Deactivate policy after published | 00:00:01 |
| GenerateMispLK — Ignored | ||
| Dependent_Idrepo_GenerateMispLK_01 | Generate MispLk all valid details | 00:00:00 |
| Dependent_Idrepo_GenerateMispLK_02 | Generate MispLk Misp false valid details | 00:00:00 |
| Dependent_Idrepo_GenerateMispLK_03 | Generate MispLk Misp S2 valid details | 00:00:00 |
| GenerateApiKey — Ignored | ||
| Dependent_Idrepo_GenerateApiKey_02 | Generate Api key Kyc valid details | 00:00:00 |
| Dependent_Idrepo_GenerateApiKey_01 | Generate Api key with valid details | 00:00:00 |
| OIDCClient — Ignored | ||
| TC_ESignet_CreateOIDCClient_25 | Create OIDC client with all valid details for MOSIP ID PAR flow | 00:00:00 |
| TC_ESignet_CreateOIDCClient_04 | Create OIDC client Auth false valid details | 00:00:00 |
| TC_ESignet_CreateOIDCClient_05 | Create OIDC client Auth S2 valid details | 00:00:00 |
| TC_ESignet_CreateOIDCClient_08 | Create OIDC client with invalid partner | 00:00:00 |
| TC_ESignet_CreateOIDCClient_07 | Create OIDC client with invalid logoUri | 00:00:00 |
| TC_ESignet_CreateOIDCClient_03 | Create OIDC client Misp valid details | 00:00:00 |
| TC_ESignet_CreateOIDCClient_02 | Create OIDC client NonAuth all valid details | 00:00:01 |
| TC_ESignet_CreateOIDCClient_24 | Create OIDC client with all valid details for userinfo | 00:00:00 |
| TC_ESignet_CreateOIDCClient_01 | Create OIDC client with all valid details | 00:00:01 |
| TC_ESignet_CreateOIDCClient_23 | Create OIDC client with all valid details for userinfo | 00:00:00 |
| TC_ESignet_CreateOIDCClient_22 | Create OIDC client with all valid details for userinfo | 00:00:00 |
| TC_ESignet_CreateOIDCClient_13 | Create OIDC client blank authpartnerId | 00:00:00 |
| TC_ESignet_CreateOIDCClient_12 | Create OIDC client with invalid authpartnerId | 00:00:00 |
| TC_ESignet_CreateOIDCClient_21 | Create OIDC client with exceeding maximum limit in authpartnerId | 00:00:00 |
| TC_ESignet_CreateOIDCClient_20 | Create OIDC client with same publicKey | 00:00:00 |
| TC_ESignet_CreateOIDCClient_17 | Create OIDC client with empty grantTypes | 00:00:00 |
| TC_ESignet_CreateOIDCClient_16 | Create OIDC client with invalid clientAuthMethods | 00:00:01 |
| TC_ESignet_CreateOIDCClient_19 | Create OIDC client with invalid grantTypes | 00:00:00 |
| TC_ESignet_CreateOIDCClient_11 | Create OIDC client with invalid policy | 00:00:00 |
| TC_ESignet_CreateOIDCClient_14 | Create OIDC client with maximum character in logouri | 00:00:00 |
| TC_ESignet_CreateOIDCClient_18 | Create OIDC client with null grantTypes | 00:00:00 |
| TC_ESignet_CreateOIDCClient_09 | Create OIDC client with null oidc | 00:00:00 |
| TC_ESignet_CreateOIDCClient_10 | Create OIDC client with null policy | 00:00:00 |
| TC_ESignet_CreateOIDCClient_15 | Create OIDC client without redirecturi | 00:00:00 |
| TC_ESignet_CreateOIDCClient_26 | Create OIDC client with all valid details for MOSIP ID DPOP flow | 00:00:00 |
| TC_ESignet_CreateOIDCClient_27 | Create OIDC client with all valid details for verified claims | 00:00:00 |
| TC_ESignet_CreateOIDCClient_28 | Create OIDC client with all valid details for without verified claims | 00:00:00 |
| OIDCClientUpdate — Ignored | ||
| Esignet_UpdateOIDC_Invalid_clientId_Neg | Update OIDC client with invalid clientId | 00:00:00 |
| Esignet_UpdateOIDC_all_Valid_Smoke | Update OIDC client with all valid details | 00:00:00 |
| GetOidcClient — Ignored | ||
| TC_ESignet_GetOidcClient_02 | Get OIDC client with invalid clientId | 00:00:01 |
| TC_ESignet_GetOidcClient_01 | Get OIDC client with all valid details | 00:00:01 |
| GenerateVID — Ignored | ||
| Dependent_Idrepo_GenerateVID_06 | Generate Onetimeuse2 VID valid details | 00:00:00 |
| Dependent_Idrepo_GenerateVID_11 | Generate Onetimeuse VID invalid scen valid details | 00:00:00 |
| Dependent_Idrepo_GenerateVID_03 | Generate Onetimeuse VID with valid details | 00:00:01 |
| Dependent_Idrepo_GenerateVID_04 | Generate perpetual2 VID with valid details | 00:00:00 |
| Dependent_Idrepo_GenerateVID_12 | Generate perpetual VID consent valid details | 00:00:00 |
| Dependent_Idrepo_GenerateVID_09 | Generate perpetual VID with invalid scenario | 00:00:00 |
| Dependent_Idrepo_GenerateVID_07 | Generate perpetual VID Kyc valid details | 00:00:00 |
| Dependent_Idrepo_GenerateVID_08 | Generate perpetual VID Linkedsce valid details | 00:00:00 |
| Dependent_Idrepo_GenerateVID_14 | Generate perpetual VID linked consent user2 valid details | 00:00:00 |
| Dependent_Idrepo_GenerateVID_13 | Generate perpetual VID linked consent valid details | 00:00:00 |
| Dependent_Idrepo_GenerateVID_16 | Generate perpetual VID VCI with invalid scenario | 00:00:00 |
| Dependent_Idrepo_GenerateVID_15 | Generate perpetual VID VCI valid details | 00:00:00 |
| Dependent_Idrepo_GenerateVID_01 | Generate perpetual VID with all valid details | 00:00:01 |
| Dependent_Idrepo_GenerateVID_05 | Generate temporary2 VID valid details | 00:00:00 |
| Dependent_Idrepo_GenerateVID_10 | Generate temporary VID invalid scen valid details | 00:00:00 |
| Dependent_Idrepo_GenerateVID_02 | Generate temporary VID with valid details | 00:00:00 |
| OIDCClientV2 — Passed | ||
| ESignet_CreateOIDCClient_Misp_Valid_Smoke_sid | To create OIDC Client V2 with all valid data | 00:00:01 |
| ESignet_CreateOIDCClient_NonAuth_all_Valid_Smoke_sid | To create OIDC Client V2 with all valid data | 00:00:01 |
| ESignet_CreateOIDCClient_all_Valid_Smoke_sid | To create OIDC Client V2 with all valid data | 00:00:03 |
| SendBindingOtp — Ignored | ||
| TC_ESignet_SendBindingOtp_28 | Send binding Otp VID with empty individualId | 00:00:00 |
| TC_ESignet_SendBindingOtp_30 | Send binding Otp VID with empty OtpChannels | 00:00:00 |
| TC_ESignet_SendBindingOtp_22 | Send binding Otp VID with future requestTime | 00:00:00 |
| TC_ESignet_SendBindingOtp_26 | Send binding Otp VID with invalid case in individualId | 00:00:00 |
| TC_ESignet_SendBindingOtp_31 | Send binding Otp VID with invalid OtpChannels | 00:00:01 |
| TC_ESignet_SendBindingOtp_20 | Send binding Otp VID with invalid requestTime | 00:00:01 |
| TC_ESignet_SendBindingOtp_27 | Send binding Otp VID without individualId | 00:00:00 |
| TC_ESignet_SendBindingOtp_29 | Send binding Otp VID without OtpChannels | 00:00:00 |
| TC_ESignet_SendBindingOtp_23 | Send binding Otp VID without requestTime | 00:00:00 |
| TC_ESignet_SendBindingOtp_21 | Send binding Otp VID with past requestTime | 00:00:00 |
| TC_ESignet_SendBindingOtp_24 | Send binding Otp VID with only space in requestTime | 00:00:00 |
| TC_ESignet_SendBindingOtp_32 | Send binding Otp VID with space separated OtpChannels | 00:00:00 |
| TC_ESignet_SendBindingOtp_02 | Send binding Otp for VID with valid details | 00:00:01 |
| TC_ESignet_SendBindingOtp_25 | Send binding Otp VID with invalid individualId | 00:00:00 |
| TC_ESignet_SendBindingOtp_03 | Send binding Otp to email for UIN with valid details | 00:00:00 |
| SendBindingOtp — Passed | ||
| TC_ESignet_SendBindingOtp_15 | Send binding Otp UIN with empty individualId | 00:00:01 |
| TC_ESignet_SendBindingOtp_17 | Send binding Otp UIN with empty OtpChannels | 00:00:01 |
| TC_ESignet_SendBindingOtp_07 | Send binding Otp for UIN with future requestTime | 00:00:01 |
| TC_ESignet_SendBindingOtp_11 | Send binding Otp for UIN with invalid case in individualId | 00:00:01 |
| TC_ESignet_SendBindingOtp_18 | Send binding Otp UIN with invalid OtpChannels | 00:00:01 |
| TC_ESignet_SendBindingOtp_05 | Send binding Otp for UIN with invalid requestTime | 00:00:01 |
| TC_ESignet_SendBindingOtp_14 | Send binding Otp UIN without individualId | 00:00:01 |
| TC_ESignet_SendBindingOtp_16 | Send binding Otp UIN without OtpChannels | 00:00:01 |
| TC_ESignet_SendBindingOtp_08 | Send binding Otp for UIN without requestTime | 00:00:01 |
| TC_ESignet_SendBindingOtp_12 | Send binding Otp for UIN NR email for individualId | 00:00:01 |
| TC_ESignet_SendBindingOtp_13 | Send binding Otp UIN NR phone for individualId | 00:00:01 |
| TC_ESignet_SendBindingOtp_06 | Send binding Otp for UIN with past requestTime | 00:00:01 |
| TC_ESignet_SendBindingOtp_04 | Send binding Otp to phone for UIN with valid details | 00:00:01 |
| TC_ESignet_SendBindingOtp_09 | Send binding Otp for UIN with space in requestTime | 00:00:01 |
| TC_ESignet_SendBindingOtp_19 | Send binding Otp UIN with space separated OtpChannels | 00:00:01 |
| TC_ESignet_SendBindingOtp_01 | Send binding Otp for UIN with all valid details | 00:00:01 |
| TC_ESignet_SendBindingOtp_10 | Send binding Otp for UIN with invalid individualId | 00:00:01 |
| WalletBinding — Ignored | ||
| TC_ESignet_WalletBinding_45 | Wallet binding VID with empty value in AuthFactorType | 00:00:00 |
| TC_ESignet_WalletBinding_48 | Wallet binding VID with empty value in challenge | 00:00:00 |
| TC_ESignet_WalletBinding_54 | Wallet binding VID with empty format | 00:00:00 |
| TC_ESignet_WalletBinding_39 | Wallet binding VID with empty individualId | 00:00:00 |
| TC_ESignet_WalletBinding_57 | Wallet binding VID with empty authFactorType1 | 00:00:00 |
| TC_ESignet_WalletBinding_60 | Wallet binding VID with empty format1 | 00:00:00 |
| TC_ESignet_WalletBinding_37 | Wallet binding VID with future requestTime | 00:00:00 |
| TC_ESignet_WalletBinding_43 | Wallet binding VID with invalid authFactorType | 00:00:00 |
| TC_ESignet_WalletBinding_47 | Wallet binding VID with invalid challenge | 00:00:00 |
| TC_ESignet_WalletBinding_51 | Wallet binding VID with invalid format | 00:00:00 |
| TC_ESignet_WalletBinding_38 | Wallet binding VID with invalid individualId | 00:00:00 |
| TC_ESignet_WalletBinding_35 | Wallet binding VID with invalid requestTime | 00:00:00 |
| TC_ESignet_WalletBinding_55 | Wallet binding VID with invalid authFactorType1 | 00:00:00 |
| TC_ESignet_WalletBinding_59 | Wallet binding VID with invalid format1 | 00:00:00 |
| TC_ESignet_WalletBinding_63 | Wallet binding VID with invalid publicKey | 00:00:00 |
| TC_ESignet_WalletBinding_44 | Wallet binding VID without AuthFactorType | 00:00:00 |
| TC_ESignet_WalletBinding_49 | Wallet binding VID without challenge | 00:00:00 |
| TC_ESignet_WalletBinding_52 | Wallet binding VID without format | 00:00:00 |
| TC_ESignet_WalletBinding_41 | Wallet binding VID without individualId | 00:00:01 |
| TC_ESignet_WalletBinding_56 | Wallet binding VID without authFactorType1 | 00:00:00 |
| TC_ESignet_WalletBinding_61 | Wallet binding VID without format1 | 00:00:00 |
| TC_ESignet_WalletBinding_40 | Wallet binding VID with Null in individualId | 00:00:00 |
| TC_ESignet_WalletBinding_64 | Wallet binding VID with Null in publicKey | 00:00:00 |
| TC_ESignet_WalletBinding_04 | Wallet binding VID with valid details | 00:00:00 |
| TC_ESignet_WalletBinding_36 | Wallet binding VID with past value in requestTime | 00:00:01 |
| TC_ESignet_WalletBinding_46 | Wallet binding VID with space in AuthFactorType | 00:00:01 |
| TC_ESignet_WalletBinding_50 | Wallet binding VID with space in challenge | 00:00:00 |
| TC_ESignet_WalletBinding_53 | Wallet binding VID with space in format | 00:00:00 |
| TC_ESignet_WalletBinding_42 | Wallet binding VID with space in individualId | 00:00:00 |
| TC_ESignet_WalletBinding_58 | Wallet binding VID with space in authFactorType1 | 00:00:01 |
| TC_ESignet_WalletBinding_62 | Wallet binding VID with space in format1 | 00:00:00 |
| WalletBinding — Passed | ||
| TC_ESignet_WalletBinding_15 | Wallet binding UIN with empty value in AuthFactorType | 00:00:01 |
| TC_ESignet_WalletBinding_18 | Wallet binding UIN with empty value in challenge | 00:00:01 |
| TC_ESignet_WalletBinding_24 | Wallet binding UIN with empty format | 00:00:01 |
| TC_ESignet_WalletBinding_09 | Wallet binding UIN with empty individualId | 00:00:01 |
| TC_ESignet_WalletBinding_27 | Wallet binding UIN with empty authFactorType1 | 00:00:01 |
| TC_ESignet_WalletBinding_30 | Wallet binding UIN with empty format1 | 00:00:01 |
| TC_ESignet_WalletBinding_07 | Wallet binding UIN with future requestTime | 00:00:01 |
| TC_ESignet_WalletBinding_13 | Wallet binding UIN with invalid AuthFactorType | 00:00:01 |
| TC_ESignet_WalletBinding_17 | Wallet binding UIN with invalid challenge | 00:00:01 |
| TC_ESignet_WalletBinding_21 | Wallet binding UIN with invalid format | 00:00:01 |
| TC_ESignet_WalletBinding_08 | Wallet binding UIN with invalid individualId | 00:00:01 |
| TC_ESignet_WalletBinding_05 | Wallet binding UIN with invalid requestTime | 00:00:01 |
| TC_ESignet_WalletBinding_25 | Wallet binding UIN with invalid authFactorType1 | 00:00:01 |
| TC_ESignet_WalletBinding_29 | Wallet binding UIN with invalid format1 | 00:00:01 |
| TC_ESignet_WalletBinding_33 | Wallet binding UIN with invalid publicKey | 00:00:01 |
| TC_ESignet_WalletBinding_14 | Wallet binding UIN with missing AuthFactorType | 00:00:01 |
| TC_ESignet_WalletBinding_19 | Wallet binding UIN with missing challenge | 00:00:01 |
| TC_ESignet_WalletBinding_22 | Wallet binding UIN with missing format | 00:00:01 |
| TC_ESignet_WalletBinding_11 | Wallet binding UIN without individualId | 00:00:01 |
| TC_ESignet_WalletBinding_26 | Wallet binding UIN with missing authFactorType1 | 00:00:01 |
| TC_ESignet_WalletBinding_31 | Wallet binding UIN without format1 | 00:00:01 |
| TC_ESignet_WalletBinding_10 | Wallet binding UIN with Null in individualId | 00:00:01 |
| TC_ESignet_WalletBinding_34 | Wallet binding UIN with Null in publicKey | 00:00:01 |
| TC_ESignet_WalletBinding_03 | Wallet binding UIN with Otp email | 00:00:01 |
| TC_ESignet_WalletBinding_02 | Wallet binding UIN with Otp phone | 00:00:01 |
| TC_ESignet_WalletBinding_01 | Wallet binding UIN with valid details | 00:00:02 |
| TC_ESignet_WalletBinding_06 | Wallet binding UIN with past value in requestTime | 00:00:01 |
| TC_ESignet_WalletBinding_16 | Wallet binding UIN with space in AuthFactorType | 00:00:01 |
| TC_ESignet_WalletBinding_20 | Wallet binding UIN with space in challenge | 00:00:01 |
| TC_ESignet_WalletBinding_23 | Wallet binding UIN with space in format | 00:00:01 |
| TC_ESignet_WalletBinding_12 | Wallet binding UIN with space in individualId | 00:00:01 |
| TC_ESignet_WalletBinding_28 | Wallet binding UIN with space in authFactorType1 | 00:00:01 |
| TC_ESignet_WalletBinding_32 | Wallet binding UIN with space in format1 | 00:00:01 |
| OAuthDetailsRequestLinkedConsent — Passed | ||
| ESignet_OAuthDetailsRequest_LinkAuth_Consent_EmptyClaim_Valid_Smoke_sid | Oauthdetails request with linkAuth consent and empty claim | 00:00:01 |
| ESignet_OAuthDetailsRequest_LinkAuth_Consent_NoClaim_Neg | Oauthdetails request with linkAuth consent and no claims | 00:00:01 |
| ESignet_OAuthDetailsRequest_LinkAuth_Consent_Valid_OnlyOptionalClaimAsRequested_AcceptedClaim_sid | Oauthdetails request with linkAuth consent with valid details | 00:00:01 |
| ESignet_OAuthDetailsRequest_LinkAuth_Consent_Valid_Smoke_sid | Oauthdetails request with linkAuth consent valid details | 00:00:01 |
| ESignet_OAuthDetailsRequest_LinkAuth_Consent_Valid_forAcceptedClaims_sid | Oauthdetails request with linkAuth consent with valid details | 00:00:01 |
| ESignet_OAuthDetailsRequest_LinkAuth_Consent_Valid_forOnlyEssentialClaims_sid | Oauthdetails request with linkAuth consent with valid details | 00:00:01 |
| ESignet_OAuthDetailsRequest_LinkAuth_Consent_Valid_forOnlyOptionalClaims_sid | Oauthdetails request with linkAuth consent with valid details | 00:00:01 |
| ESignet_OAuthDetailsRequest_LinkAuth_Consent_Valid_forPartialEssential_OptionalClaims_sid | Oauthdetails request with linkAuth consent with valid details | 00:00:01 |
| ESignet_OAuthDetailsRequest_LinkAuth_Consent_Valid_null_asEssentialClaims_AcceptedClaim_sid | Oauthdetails request with linkAuth consent with valid details | 00:00:01 |
| ESignet_OAuthDetailsRequest_LinkAuth_Consent_Valid_without_AcceptedClaim_IfOnlyOptionalRequested_sid | Oauthdetails request with linkAuth consent with valid details | 00:00:01 |
| ESignet_OAuthDetailsRequest_LinkAuth_Consent_vid_Valid_Smoke_sid | Oauthdetails request with linkAuth consent valid details | 00:00:01 |
| GenerateLinkCodeConsent — Ignored | ||
| TC_ESignet_GenerateLinkCodeConsent_02 | Generate LinkCode consent VID with all valid details | 00:00:00 |
| GenerateLinkCodeConsent — Passed | ||
| TC_ESignet_GenerateLinkCodeConsent_03 | Generate LinkCode consent UIN with empty claim all valid details | 00:00:01 |
| TC_ESignet_GenerateLinkCodeConsent_08 | Generate LinkCode consent UIN for Only OptionalClaim As Requestedclaim | 00:00:01 |
| TC_ESignet_GenerateLinkCodeConsent_01 | Generate LinkCode consent UIN with all valid details | 00:00:01 |
| TC_ESignet_GenerateLinkCodeConsent_04 | Generate LinkCode consent UIN for accepted claims | 00:00:01 |
| TC_ESignet_GenerateLinkCodeConsent_07 | Generate LinkCode consent UIN for Null as EssentialClaim | 00:00:01 |
| TC_ESignet_GenerateLinkCodeConsent_06 | Generate LinkCode consent UIN for OnlyEssentialClaim | 00:00:01 |
| TC_ESignet_GenerateLinkCodeConsent_05 | Generate LinkCode consent UIN for optional cliams | 00:00:01 |
| TC_ESignet_GenerateLinkCodeConsent_05 | Generate LinkCode consent UIN for optional cliams | 00:00:01 |
| TC_ESignet_GenerateLinkCodeConsent_09 | Generate LinkCode consent UIN without AcceptedClaim IfOnlyOptionalRequested | 00:00:01 |
| LinkTransactionConsent — Ignored | ||
| TC_ESignet_LinkTransactionConsent_02 | Link transaction consent VID with all valid details | 00:00:00 |
| LinkTransactionConsent — Passed | ||
| TC_ESignet_LinkTransactionConsent_03 | Link transaction consent UIN with empty claim | 00:00:01 |
| TC_ESignet_LinkTransactionConsent_08 | Link transaction consent UIN for OnlyOptionalClaimAsRequested | 00:00:01 |
| TC_ESignet_LinkTransactionConsent_01 | Link transaction consent UIN with all valid details | 00:00:01 |
| TC_ESignet_LinkTransactionConsent_04 | Link transaction consent UIN for accepted claims | 00:00:01 |
| TC_ESignet_LinkTransactionConsent_07 | Link transaction consent UIN for Only EssentialClaims | 00:00:01 |
| TC_ESignet_LinkTransactionConsent_06 | Link transaction consent UIN for Only EssentialClaims | 00:00:01 |
| TC_ESignet_LinkTransactionConsent_05 | Link transaction consent UIN for optional claims | 00:00:01 |
| TC_ESignet_LinkTransactionConsent_05 | Link transaction consent UIN for optional claims | 00:00:01 |
| TC_ESignet_LinkTransactionConsent_09 | Link transaction consent UIN without_AcceptedClaim_IfOnlyOptionalRequested | 00:00:01 |
| GetLinkStatusConsent — Ignored | ||
| TC_ESignet_GetLinkStatusConsent_02 | Get link status consent VID with all valid details | 00:00:00 |
| GetLinkStatusConsent — Passed | ||
| TC_ESignet_GetLinkStatusConsent_03 | Get link status consent UIN with empty claim | 00:00:01 |
| TC_ESignet_GetLinkStatusConsent_09 | Get link status consent UIN for OnlyOptionalClaimAsRequested | 00:00:01 |
| TC_ESignet_GetLinkStatusConsent_01 | Get link status consent UIN with all valid details | 00:00:01 |
| TC_ESignet_GetLinkStatusConsent_04 | Get link status consent UIN for accepted claims | 00:00:01 |
| TC_ESignet_GetLinkStatusConsent_08 | Get link status consent UIN for null as Essential Claims | 00:00:01 |
| TC_ESignet_GetLinkStatusConsent_07 | Get link status consent UIN for Only Essential Claims | 00:00:01 |
| TC_ESignet_GetLinkStatusConsent_05 | Get link status consent UIN for optional claims | 00:00:01 |
| TC_ESignet_GetLinkStatusConsent_06 | Get link status consent UIN for optional claims | 00:00:01 |
| TC_ESignet_GetLinkStatusConsent_10 | Get link status consent UIN without_AcceptedClaim_IfOnlyOptionalRequested | 00:00:01 |
| LinkedAuthenticationConsentWla — Ignored | ||
| ESignet_LinkedAuthenticationWla_ConsentVid_SCert_all_Valid_Smoke_sid | LinkedAuthenticationWla consent VID SCert with all valid details | 00:00:00 |
| LinkedAuthenticationConsentWla — Passed | ||
| ESignet_LinkedAuthenticationWla_Consent_EmptyClaim_uin_SCert_all_Valid_Smoke_sid | LinkedAuthenticationWla consent UIN with empty claim | 00:00:01 |
| ESignet_LinkedAuthenticationWla_Consent_forAcceptedClaims_SCert_sid | LinkedAuthenticationWla consent UIN SCert with all valid details for accepted claims | 00:00:01 |
| ESignet_LinkedAuthenticationWla_Consent_forNullAsEssentialClaims_SCert_sid | LinkedAuthenticationWla consent UIN SCert with all valid details for NullAsEssentialClaims | 00:00:01 |
| ESignet_LinkedAuthenticationWla_Consent_forOnlyEssentialClaims_SCert_sid | LinkedAuthenticationWla consent UIN SCert with all valid details for only essential Claims | 00:00:01 |
| ESignet_LinkedAuthenticationWla_Consent_forOnlyOptionalClaimAsRequested_SCert_sid | LinkedAuthenticationWla consent UIN SCert with all valid details for forOnlyOptionalClaimAsRequested | 00:00:01 |
| ESignet_LinkedAuthenticationWla_Consent_forOptionalClaims_SCert_sid | LinkedAuthenticationWla consent UIN SCert with all valid details for optional claims | 00:00:01 |
| ESignet_LinkedAuthenticationWla_Consent_forPartialEssentialOptionalClaims_SCert_sid | LinkedAuthenticationWla consent UIN SCert with all valid details for PartialEssential OptionalClaims | 00:00:01 |
| ESignet_LinkedAuthenticationWla_Consent_without_AcceptedClaim_IfOnlyOptionalRequested_SCert_sid | LinkedAuthenticationWla consent UIN SCert with all valid details without_AcceptedClaim_IfOnlyOptionalRequested | 00:00:01 |
| ESignet_LinkedAuthenticationWla_Consentuin_SCert_all_Valid_Smoke_sid | LinkedAuthenticationWla consent UIN SCert with all valid details | 00:00:01 |
| LinkAuthorizationConsent — Ignored | ||
| TC_ESignet_LinkedAuthorizationConsent_02 | Linked Authorization conset VID with all valid details | 00:00:00 |
| LinkAuthorizationConsent — Passed | ||
| TC_ESignet_LinkedAuthorizationConsent_03 | Linked Authorization conset UIN with all valid details for accepted claims | 00:00:01 |
| TC_ESignet_LinkedAuthorizationConsent_07 | Linked Authorization conset UIN with all valid details for Null As accepted claims | 00:00:01 |
| TC_ESignet_LinkedAuthorizationConsent_06 | Linked Authorization conset UIN with all valid details for OnlyEssentialClaim | 00:00:01 |
| TC_ESignet_LinkedAuthorizationConsent_08 | Linked Authorization conset UIN with all valid details for OnlyOptionalClaimAsRequested | 00:00:01 |
| TC_ESignet_LinkedAuthorizationConsent_04 | Linked Authorization conset UIN with all valid details for Optional claims | 00:00:01 |
| TC_ESignet_LinkedAuthorizationConsent_05 | Linked Authorization conset UIN with all valid details for PartialEssential OptionalClaim | 00:00:01 |
| TC_ESignet_LinkedAuthorizationConsent_01 | Linked Authorization conset UIN with all valid details | 00:00:01 |
| TC_ESignet_LinkedAuthorizationConsent_09 | Linked Authorization conset UIN with all valid details without_AcceptedClaim_IfOnlyOptionalRequested | 00:00:01 |
| LinkAuthorizationCodeConsent — Ignored | ||
| TC_ESignet_LinkAuthorizationCodeConsent_02 | Link Authorization code consent VID with all valid details | 00:00:00 |
| LinkAuthorizationCodeConsent — Passed | ||
| TC_ESignet_LinkAuthorizationCodeConsent_01 | Link Authorization code consent UIN with all valid details | 00:00:01 |
| GenerateTokenLinkedConsent — Ignored | ||
| ESignet_GenerateToken_LinkedConsent_Vid_Valid_Smoke_sid | Generate Token linkedConsent VID with all valid details | 00:00:00 |
| GenerateTokenLinkedConsent — Passed | ||
| ESignet_GenerateToken_LinkedConsent_uin_Valid_Smoke_sid | Generate Token linkedConsent UIN with all valid details | 00:00:01 |
| GetOidcUserInfoLinkedConsent — Ignored | ||
| TC_ESignet_GetOidcUserInfoLinkedConsent_02 | Get OIDC user info for linked consent VID with all valid details | 00:00:00 |
| GetOidcUserInfoLinkedConsent — Passed | ||
| TC_ESignet_GetOidcUserInfoLinkedConsent_01 | Get OIDC user info for linked consent UIN with all valid details | 00:00:01 |
| OAuthDetailsRequestLinked — Ignored | ||
| TC_ESignet_OAuthDetailsRequestLinked_06 | Oauthdetails request linkAuth consent with same claim details VID | 00:00:00 |
| TC_ESignet_OAuthDetailsRequestLinked_04 | Oauthdetails request linkAuth consent User2 VID with valid details | 00:00:00 |
| TC_ESignet_OAuthDetailsRequestLinked_02 | Oauthdetails request linkAuth VID with all valid details | 00:00:00 |
| OAuthDetailsRequestLinked — Passed | ||
| TC_ESignet_OAuthDetailsRequestLinked_05 | Oauthdetails request linkAuth consent with same claim details UIN | 00:00:01 |
| TC_ESignet_OAuthDetailsRequestLinked_03 | Oauthdetails request linkAuth consent User2 UIN with valid details | 00:00:01 |
| TC_ESignet_OAuthDetailsRequestLinked_08 | Oauthdetails request for InvalidAcceptedClaim | 00:00:01 |
| TC_ESignet_OAuthDetailsRequestLinked_07 | Oauthdetails request other linkAuth with valid details | 00:00:01 |
| TC_ESignet_OAuthDetailsRequestLinked_01 | Oauthdetails request linkAuth with all valid details | 00:00:01 |
| TC_ESignet_OAuthDetailsRequestLinked_14 | Oauthdetails request for EmptyAcceptedClaimIfRequestedIsOptional | 00:00:01 |
| TC_ESignet_OAuthDetailsRequestLinked_12 | Oauthdetails request for without accepted claim | 00:00:01 |
| TC_ESignet_OAuthDetailsRequestLinked_11 | Oauthdetails request for only essential claim if essential and optional are requested claim | 00:00:01 |
| TC_ESignet_OAuthDetailsRequestLinked_13 | Oauthdetails request for for Only Optional Claim If Requested Optional | 00:00:01 |
| TC_ESignet_OAuthDetailsRequestLinked_10 | Oauthdetails request for only Partial Eseential And OptionalClaim | 00:00:01 |
| TC_ESignet_OAuthDetailsRequestLinked_09 | Oauthdetails request for only optional claim if essential and optional claims are requested claims | 00:00:01 |
| GenerateLinkCode — Ignored | ||
| TC_ESignet_GenerateLinkCode_06 | Generate link code consent VID with same claim details | 00:00:00 |
| TC_ESignet_GenerateLinkCode_04 | Generate link code consent VID user2 with all valid details | 00:00:00 |
| TC_ESignet_GenerateLinkCode_02 | Generate link code with all valid details VID | 00:00:00 |
| GenerateLinkCode — Passed | ||
| TC_ESignet_GenerateLinkCode_17 | Generate link code consent UIN with same claim details for InvalidAcceptedClaim | 00:00:01 |
| TC_ESignet_GenerateLinkCode_05 | Generate link code consent UIN with same claim details | 00:00:01 |
| TC_ESignet_GenerateLinkCode_03 | Generate link code consent UIN user2 with all valid details | 00:00:01 |
| TC_ESignet_GenerateLinkCode_23 | Generate link code consent UIN with claim details forEmptyAcceptedClaimIfRequestedIsOptional | 00:00:01 |
| TC_ESignet_GenerateLinkCode_21 | Generate link code consent UIN with claim details forEmptyAsAcceptedClaim_EseentialClaim | 00:00:01 |
| TC_ESignet_GenerateLinkCode_20 | Generate link code consent UIN with claim details for only essential claim if essential and optional are requested claim | 00:00:01 |
| TC_ESignet_GenerateLinkCode_22 | Generate link code consent UIN with claim details forOnlyOptionalClaimIfRequestedOptional | 00:00:01 |
| TC_ESignet_GenerateLinkCode_19 | Generate link code consent UIN with claim details for Partial Eseential And Optional Claim | 00:00:01 |
| TC_ESignet_GenerateLinkCode_18 | Generate link code consent UIN with claim details for OnlyOptionalClaim_IfEssAndOptAsRequestedClaim | 00:00:01 |
| TC_ESignet_GenerateLinkCode_15 | Generate link code with empty transactionId | 00:00:01 |
| TC_ESignet_GenerateLinkCode_13 | Generate link code with expired transactionId | 00:00:01 |
| TC_ESignet_GenerateLinkCode_09 | Generate link code with future requestTime | 00:00:01 |
| TC_ESignet_GenerateLinkCode_07 | Generate link code with invalid requestTime | 00:00:01 |
| TC_ESignet_GenerateLinkCode_12 | Generate link code with invalid transactionId | 00:00:01 |
| TC_ESignet_GenerateLinkCode_10 | Generate link code without requestTime | 00:00:01 |
| TC_ESignet_GenerateLinkCode_14 | Generate link code without transactionId | 00:00:01 |
| TC_ESignet_GenerateLinkCode_16 | Generate link code with Null in transactionId | 00:00:01 |
| TC_ESignet_GenerateLinkCode_08 | Generate link code with past requestTime | 00:00:01 |
| TC_ESignet_GenerateLinkCode_11 | Generate link code with only space in requestTime | 00:00:01 |
| TC_ESignet_GenerateLinkCode_01 | Generate link code with all valid details | 00:00:01 |
| LinkTransaction — Ignored | ||
| TC_ESignet_LinkTransaction_06 | link transaction consent VID with same claim and all valid details | 00:00:00 |
| TC_ESignet_LinkTransaction_04 | link transaction consent VID User2 with all valid details | 00:00:00 |
| TC_ESignet_LinkTransaction_02 | link transaction VID with all valid details | 00:00:01 |
| LinkTransaction — Passed | ||
| TC_ESignet_LinkTransaction_10 | link transaction without requestTime | 00:00:01 |
| TC_ESignet_LinkTransaction_05 | link transaction consent UIN with same claim and all valid details | 00:00:01 |
| TC_ESignet_LinkTransaction_03 | link transaction consent UIN User2 with all valid details | 00:00:01 |
| TC_ESignet_LinkTransaction_16 | link transaction with empty value in linkCode | 00:00:01 |
| TC_ESignet_LinkTransaction_12 | link transaction with empty value in requestTime | 00:00:01 |
| TC_ESignet_LinkTransaction_15 | link transaction with expired linkCode | 00:00:01 |
| TC_ESignet_LinkTransaction_13 | link transaction with invalid linkCode | 00:00:01 |
| TC_ESignet_LinkTransaction_07 | link transaction with invalid requestTime | 00:00:01 |
| TC_ESignet_LinkTransaction_14 | link transaction without linkCode | 00:00:01 |
| TC_ESignet_LinkTransaction_17 | link transaction with Null in linkCode | 00:00:01 |
| TC_ESignet_LinkTransaction_09 | link transaction with future value in requestTime | 00:00:01 |
| TC_ESignet_LinkTransaction_08 | link transaction with past value in requestTime | 00:00:01 |
| TC_ESignet_LinkTransaction_11 | link transaction with only space in requestTime | 00:00:01 |
| TC_ESignet_LinkTransaction_01 | link transaction with all valid details | 00:00:01 |
| TC_ESignet_LinkTransaction_24 | link transaction with valid details forEmptyAcceptedClaimIfRequestedIsOptional | 00:00:01 |
| TC_ESignet_LinkTransaction_22 | link transaction with valid details forEmptyAsAcceptedClaim_EseentialClaim | 00:00:01 |
| TC_ESignet_LinkTransaction_18 | link transaction with valid details for InvalidAcceptedClaim | 00:00:01 |
| TC_ESignet_LinkTransaction_21 | link transaction with valid details for forOnlyEseentialClaim | 00:00:01 |
| TC_ESignet_LinkTransaction_23 | link transaction with valid details forOnlyOptionalClaimIfRequestedOptional | 00:00:01 |
| TC_ESignet_LinkTransaction_20 | link transaction with valid details for PartialEseentialAndOptionalClaim | 00:00:01 |
| TC_ESignet_LinkTransaction_19 | link transaction with valid details for withOnlyOptionalClaim_IfEssAndOptAsRequestedClaim | 00:00:01 |
| GetLinkStatus — Ignored | ||
| TC_ESignet_GetLinkStatus_06 | Get link status consent UIN with same claim and all valid details | 00:00:00 |
| TC_ESignet_GetLinkStatus_04 | Get link status consent VID User2 with all valid details | 00:00:00 |
| TC_ESignet_GetLinkStatus_02 | Get link status with all valid details VID | 00:00:00 |
| GetLinkStatus — Passed | ||
| TC_ESignet_GetLinkStatus_05 | Get link status consent UIN with same claim and all valid details | 00:00:01 |
| TC_ESignet_GetLinkStatus_03 | Get link status consent UIN User2 with all valid details | 00:00:01 |
| TC_ESignet_GetLinkStatus_21 | Get link status with empty linkCode | 00:00:01 |
| TC_ESignet_GetLinkStatus_14 | Get link status with empty transactionId | 00:00:01 |
| TC_ESignet_GetLinkStatus_19 | Get link status with expired linkCode | 00:00:01 |
| TC_ESignet_GetLinkStatus_13 | Get link status with expired transactionId | 00:00:01 |
| TC_ESignet_GetLinkStatus_09 | Get link status with future value in requestTime | 00:00:01 |
| TC_ESignet_GetLinkStatus_18 | Get link status with invalid linkCode | 00:00:01 |
| TC_ESignet_GetLinkStatus_07 | Get link status with invalid requestTime | 00:00:01 |
| TC_ESignet_GetLinkStatus_12 | Get link status with invalid transactionId | 00:00:01 |
| TC_ESignet_GetLinkStatus_20 | Get link status without linkCode | 00:00:01 |
| TC_ESignet_GetLinkStatus_10 | Get link status without requestTime | 00:00:01 |
| TC_ESignet_GetLinkStatus_15 | Get link status without transactionId | 00:00:01 |
| TC_ESignet_GetLinkStatus_22 | Get link status with Null in linkCode | 00:00:01 |
| TC_ESignet_GetLinkStatus_16 | Get link status with Null in transactionId | 00:00:01 |
| TC_ESignet_GetLinkStatus_08 | Get link status with past value in requestTime | 00:00:01 |
| TC_ESignet_GetLinkStatus_23 | Get link status with space in linkCode | 00:00:01 |
| TC_ESignet_GetLinkStatus_11 | Get link status with only space in requestTime | 00:00:01 |
| TC_ESignet_GetLinkStatus_17 | Get link status with only space in transactionId | 00:00:01 |
| TC_ESignet_GetLinkStatus_01 | Get link status with all valid details | 00:00:01 |
| LinkedAuthenticationWla — Ignored | ||
| TC_ESignet_LinkedAuthenticationWla_02 | Linked AuthenticationWla consent same claim VID SCert all valid details | 00:00:01 |
| TC_ESignet_LinkedAuthenticationWla_04 | Linked AuthenticationWla consent User2 UIN SCert all valid details | 00:00:00 |
| TC_ESignet_LinkedAuthenticationWla_06 | Linked AuthenticationWla VID SCert all valid details | 00:00:00 |
| LinkedAuthenticationWla — Passed | ||
| TC_ESignet_LinkedAuthenticationWla_01 | Linked AuthenticationWla consent same claim UIN SCert all valid details | 00:00:01 |
| TC_ESignet_LinkedAuthenticationWla_03 | Linked AuthenticationWla consent User2 UIN SCert all valid details | 00:00:01 |
| TC_ESignet_LinkedAuthenticationWla_07 | Linked AuthenticationWla VID SCert all valid details | 00:00:01 |
| TC_ESignet_LinkedAuthenticationWla_13 | Linked AuthenticationWla for EmptyAcceptedClaimIfRequestedIsOptional | 00:00:01 |
| TC_ESignet_LinkedAuthenticationWla_11 | Linked AuthenticationWla VID SCert all valid details | 00:00:01 |
| TC_ESignet_LinkedAuthenticationWla_10 | Linked AuthenticationWla VID SCert all valid details | 00:00:01 |
| TC_ESignet_LinkedAuthenticationWla_12 | Linked AuthenticationWla VID SCert all valid details | 00:00:01 |
| TC_ESignet_LinkedAuthenticationWla_09 | Linked AuthenticationWla VID SCert all valid details | 00:00:01 |
| TC_ESignet_LinkedAuthenticationWla_05 | Linked AuthenticationWla UIN SCert all valid details | 00:00:01 |
| TC_ESignet_LinkedAuthenticationWla_08 | Linked AuthenticationWla VID SCert all valid details | 00:00:01 |
| LinkedAuthorizationConsent — Ignored | ||
| TC_ESignet_LinkedAuthorizationConsent_02 | Linked authorization consent with same claim VID | 00:00:00 |
| TC_ESignet_LinkedAuthorizationConsent_04 | Linked authorization consent with User2 VID | 00:00:00 |
| TC_ESignet_LinkedAuthorizationConsent_06 | Linked authorization consent with all valid details VID | 00:00:00 |
| LinkedAuthorizationConsent — Passed | ||
| TC_ESignet_LinkedAuthorizationConsent_05 | Linked authorization consent with all valid details | 00:00:01 |
| TC_ESignet_LinkedAuthorizationConsent_01 | Linked authorization consent with same claim UIN | 00:00:01 |
| TC_ESignet_LinkedAuthorizationConsent_03 | Linked authorization consent with User2 UIN | 00:00:01 |
| TC_ESignet_LinkedAuthorizationConsent_14 | Linked authorization consent with empty transactionId | 00:00:01 |
| TC_ESignet_LinkedAuthorizationConsent_11 | Linked authorization consent with empty value in requestTime | 00:00:01 |
| TC_ESignet_LinkedAuthorizationConsent_09 | Linked authorization consent with future value in requestTime | 00:00:01 |
| TC_ESignet_LinkedAuthorizationConsent_20 | Linked authorization consent with InvalidAcceptedClaim | 00:00:01 |
| TC_ESignet_LinkedAuthorizationConsent_16 | Linked authorization consent with invalid accepted claims | 00:00:01 |
| TC_ESignet_LinkedAuthorizationConsent_07 | Linked authorization consent with invalid requestTime | 00:00:01 |
| TC_ESignet_LinkedAuthorizationConsent_12 | Linked authorization consent with invalid transactionId | 00:00:01 |
| TC_ESignet_LinkedAuthorizationConsent_18 | Linked authorization consent with invalid accepted claims | 00:00:01 |
| TC_ESignet_LinkedAuthorizationConsent_13 | Linked authorization consent without transactionId | 00:00:01 |
| TC_ESignet_LinkedAuthorizationConsent_17 | Linked authorization consent with Null in accepted claims | 00:00:01 |
| TC_ESignet_LinkedAuthorizationConsent_19 | Linked authorization consent with Null in permittedAuthorizeScopes | 00:00:01 |
| TC_ESignet_LinkedAuthorizationConsent_08 | Linked authorization consent with past value in requestTime | 00:00:01 |
| TC_ESignet_LinkedAuthorizationConsent_10 | Linked authorization consent with only space in requestTime | 00:00:01 |
| TC_ESignet_LinkedAuthorizationConsent_15 | Linked authorization consent with space in transactionId | 00:00:01 |
| TC_ESignet_LinkedAuthorizationConsent_26 | Linked authorization consent for Empty Accepted Claim If Requested Is Optional | 00:00:01 |
| TC_ESignet_LinkedAuthorizationConsent_24 | Linked authorization consent for EmptyAsAcceptedClaim_EseentialClaim | 00:00:01 |
| TC_ESignet_LinkedAuthorizationConsent_23 | Linked authorization consent for forOnlyEseentialClaim | 00:00:01 |
| TC_ESignet_LinkedAuthorizationConsent_25 | Linked authorization consent for optional claim if requested claim is optional | 00:00:01 |
| TC_ESignet_LinkedAuthorizationConsent_22 | Linked authorization consent for PartialEseentialAndOptionalClaim | 00:00:01 |
| TC_ESignet_LinkedAuthorizationConsent_21 | Linked authorization consent with withOnlyOptionalClaim IfEssAndOptAsRequestedClaim | 00:00:01 |
| LinkAuthorizationCode — Ignored | ||
| TC_ESignet_LinkAuthorizationCode_02 | Link Authorization code consent VID with same claim and all valid details | 00:00:00 |
| TC_ESignet_LinkAuthorizationCode_04 | Link Authorization code consent VID for User2 with all valid details | 00:00:00 |
| TC_ESignet_LinkAuthorizationCode_06 | Link Authorization code with all valid details VID | 00:00:00 |
| LinkAuthorizationCode — Passed | ||
| TC_ESignet_LinkAuthorizationCode_01 | Link Authorization code consent UIN with same claim and all valid details | 00:00:01 |
| TC_ESignet_LinkAuthorizationCode_03 | Link Authorization code consent UIN for User2 with all valid details | 00:00:01 |
| TC_ESignet_LinkAuthorizationCode_15 | Link Authorization code with empty value in transactionId | 00:00:01 |
| TC_ESignet_LinkAuthorizationCode_19 | Link Authorization code with empty value in linkedCode | 00:00:01 |
| TC_ESignet_LinkAuthorizationCode_10 | Link Authorization code with empty value in requestTime | 00:00:01 |
| TC_ESignet_LinkAuthorizationCode_09 | Link Authorization code with future value requestTime | 00:00:01 |
| TC_ESignet_LinkAuthorizationCode_12 | Link Authorization code with invalid transactionId | 00:00:01 |
| TC_ESignet_LinkAuthorizationCode_16 | Link Authorization code with invalid linkedCode | 00:00:01 |
| TC_ESignet_LinkAuthorizationCode_07 | Link Authorization code with invalid requestTime | 00:00:01 |
| TC_ESignet_LinkAuthorizationCode_14 | Link Authorization code without transactionId | 00:00:01 |
| TC_ESignet_LinkAuthorizationCode_17 | Link Authorization code without linkedCode | 00:00:01 |
| TC_ESignet_LinkAuthorizationCode_08 | Link Authorization code with past value in requestTime | 00:00:01 |
| TC_ESignet_LinkAuthorizationCode_13 | Link Authorization code with only space in transactionId | 00:00:01 |
| TC_ESignet_LinkAuthorizationCode_18 | Link Authorization code with only space in linkedCode | 00:00:01 |
| TC_ESignet_LinkAuthorizationCode_11 | Link Authorization code with only space in requestTime | 00:00:01 |
| TC_ESignet_LinkAuthorizationCode_05 | Link Authorization code with all valid details | 00:00:01 |
| GenerateTokenLinked — Ignored | ||
| TC_ESignet_GenerateTokenLinked_04 | Generate token linked VID with same claim and all valid details | 00:00:00 |
| TC_ESignet_GenerateTokenLinked_06 | Generate token linked VID for User2 with all valid details | 00:00:00 |
| TC_ESignet_GenerateTokenLinked_02 | Generate token linked VID with all valid details | 00:00:00 |
| GenerateTokenLinked — Passed | ||
| TC_ESignet_GenerateTokenLinked_03 | Generate token linked UIN with same claim and all valid details | 00:00:01 |
| TC_ESignet_GenerateTokenLinked_05 | Generate token linked UIN for User2 with all valid details | 00:00:01 |
| TC_ESignet_GenerateTokenLinked_01 | Generate token linked UIN with all valid details | 00:00:01 |
| GetOidcUserInfoLinked — Ignored | ||
| TC_ESignet_GetOidcUserInfoLinked_04 | Get OIDC user info linked VID with same claim and all valid details | 00:00:00 |
| TC_ESignet_GetOidcUserInfoLinked_06 | Get OIDC user info linked VID for user2 with all valid details | 00:00:01 |
| TC_ESignet_GetOidcUserInfoLinked_02 | Get OIDC user info linked VID with all valid details | 00:00:00 |
| GetOidcUserInfoLinked — Passed | ||
| TC_ESignet_GetOidcUserInfoLinked_03 | Get OIDC user info linked UIN with same claim and all valid details | 00:00:01 |
| TC_ESignet_GetOidcUserInfoLinked_05 | Get OIDC user info linked UIN for user2 with all valid details | 00:00:01 |
| TC_ESignet_GetOidcUserInfoLinked_01 | Get OIDC user info linked UIN with all valid details | 00:00:01 |
| OAuthDetailsRequestNonAuth — Ignored | ||
| TC_ESignet_OAuthDetailsRequestNonAuth_04 | Oauthdetails request with NonAuth BioFace and all valid details VID | 00:00:00 |
| TC_ESignet_OAuthDetailsRequestNonAuth_26 | Oauthdetails request with NonAuth LeftIris and all valid details VID | 00:00:00 |
| TC_ESignet_OAuthDetailsRequestNonAuth_10 | Oauthdetails request with NonAuth LeftLittleFinger and all valid details VID | 00:00:00 |
| TC_ESignet_OAuthDetailsRequestNonAuth_08 | Oauthdetails request with NonAuth LeftMiddleFinger and all valid details VID | 00:00:00 |
| TC_ESignet_OAuthDetailsRequestNonAuth_20 | Oauthdetails request with NonAuth LeftThumb and all valid details VID | 00:00:00 |
| TC_ESignet_OAuthDetailsRequestNonAuth_02 | Oauthdetails request with NonAuth Otp and all valid details VID | 00:00:01 |
| TC_ESignet_OAuthDetailsRequestNonAuth_12 | Oauthdetails request with NonAuth RightIndexFinger and all valid details VID | 00:00:00 |
| TC_ESignet_OAuthDetailsRequestNonAuth_24 | Oauthdetails request with NonAuth RightIris and all valid details VID | 00:00:00 |
| TC_ESignet_OAuthDetailsRequestNonAuth_18 | Oauthdetails request with NonAuth RightLittleFinger and all valid details VID | 00:00:01 |
| TC_ESignet_OAuthDetailsRequestNonAuth_16 | Oauthdetails request with NonAuth RightMiddleFinger and all valid details VID | 00:00:00 |
| TC_ESignet_OAuthDetailsRequestNonAuth_14 | Oauthdetails request with NonAuth RightRingFinger and all valid details VID | 00:00:00 |
| TC_ESignet_OAuthDetailsRequestNonAuth_22 | Oauthdetails request with NonAuth RightThumb and all valid details VID | 00:00:00 |
| TC_ESignet_OAuthDetailsRequestNonAuth_06 | Oauthdetails request with NonAuth RingFinger and all valid details VID | 00:00:00 |
| OAuthDetailsRequestNonAuth — Passed | ||
| TC_ESignet_OAuthDetailsRequestNonAuth_03 | Oauthdetails request with NonAuth BioFace and all valid details | 00:00:01 |
| TC_ESignet_OAuthDetailsRequestNonAuth_25 | Oauthdetails request with NonAuth LeftIris and all valid details | 00:00:01 |
| TC_ESignet_OAuthDetailsRequestNonAuth_09 | Oauthdetails request with NonAuth LeftLittleFinger and all valid details | 00:00:01 |
| TC_ESignet_OAuthDetailsRequestNonAuth_07 | Oauthdetails request with NonAuth LeftMiddleFinger and all valid details | 00:00:01 |
| TC_ESignet_OAuthDetailsRequestNonAuth_19 | Oauthdetails request with NonAuth LeftThumb and all valid details | 00:00:01 |
| TC_ESignet_OAuthDetailsRequestNonAuth_01 | Oauthdetails request with NonAuth Otp and all valid details | 00:00:01 |
| TC_ESignet_OAuthDetailsRequestNonAuth_11 | Oauthdetails request with NonAuth RightIndexFinger and all valid details | 00:00:01 |
| TC_ESignet_OAuthDetailsRequestNonAuth_23 | Oauthdetails request with NonAuth RightIris and all valid details | 00:00:01 |
| TC_ESignet_OAuthDetailsRequestNonAuth_17 | Oauthdetails request with NonAuth RightLittleFinger and all valid details | 00:00:01 |
| TC_ESignet_OAuthDetailsRequestNonAuth_15 | Oauthdetails request with NonAuth RightMiddleFinger and all valid details | 00:00:01 |
| TC_ESignet_OAuthDetailsRequestNonAuth_13 | Oauthdetails request with NonAuth RightRingFinger and all valid details | 00:00:01 |
| TC_ESignet_OAuthDetailsRequestNonAuth_21 | Oauthdetails request with NonAuth RightThumb and all valid details | 00:00:01 |
| TC_ESignet_OAuthDetailsRequestNonAuth_05 | Oauthdetails request with NonAuth RingFinger and all valid details | 00:00:01 |
| BioNonAuth — Ignored | ||
| TC_ESignet_BioNonAuth_01 | Face biometric with NonAuth and valid details UIN | 00:00:00 |
| TC_ESignet_BioNonAuth_24 | LeftIris biometric with NonAuth VID | 00:00:00 |
| TC_ESignet_BioNonAuth_12 | LeftIris biometric with NonAuth UIN | 00:00:00 |
| TC_ESignet_BioNonAuth_16 | LeftLittleFinger biometric with NonAuth VID | 00:00:00 |
| TC_ESignet_BioNonAuth_04 | LeftLittleFinger biometric with NonAuth UIN | 00:00:00 |
| TC_ESignet_BioNonAuth_15 | LeftMiddleFinger biometric with NonAuth VID | 00:00:00 |
| TC_ESignet_BioNonAuth_03 | LeftMiddleFinger biometric with NonAuth UIN | 00:00:00 |
| TC_ESignet_BioNonAuth_21 | LeftThumb biometric with NonAuth VID | 00:00:00 |
| TC_ESignet_BioNonAuth_09 | LeftThumb biometric with NonAuth UIN | 00:00:00 |
| TC_ESignet_BioNonAuth_17 | RightIndexFinger biometric with NonAuth VID | 00:00:00 |
| TC_ESignet_BioNonAuth_05 | RightIndexFinger biometric with NonAuth UIN | 00:00:00 |
| TC_ESignet_BioNonAuth_23 | RightIris biometric with NonAuth VID | 00:00:00 |
| TC_ESignet_BioNonAuth_11 | RightIris biometric with NonAuth UIN | 00:00:00 |
| TC_ESignet_BioNonAuth_20 | RightLittleFinger biometric with NonAuth VID | 00:00:00 |
| TC_ESignet_BioNonAuth_08 | RightLittleFinger biometric with NonAuth UIN | 00:00:00 |
| TC_ESignet_BioNonAuth_19 | RightMiddleFinger biometric with NonAuth VID | 00:00:00 |
| TC_ESignet_BioNonAuth_07 | RightMiddleFinger biometric with NonAuth UIN | 00:00:00 |
| TC_ESignet_BioNonAuth_18 | RightRingFinger biometric with NonAuth VID | 00:00:00 |
| TC_ESignet_BioNonAuth_06 | RightRingFinger biometric with NonAuth UIN | 00:00:00 |
| TC_ESignet_BioNonAuth_22 | RightThumb biometric with NonAuth VID | 00:00:00 |
| TC_ESignet_BioNonAuth_10 | RightThumb biometric with NonAuth UIN | 00:00:00 |
| TC_ESignet_BioNonAuth_14 | RingFinger biometric with NonAuth VID | 00:00:00 |
| TC_ESignet_BioNonAuth_02 | RingFinger biometric with NonAuth UIN | 00:00:00 |
| TC_ESignet_BioNonAuth_13 | Face biometric with NonAuth and valid details VID | 00:00:00 |
| AuthenticateUserNonAuth — Ignored | ||
| TC_ESignet_AuthenticateUserNonAuth_02 | Authenticate User with NonAuth Otp with valid details VID | 00:00:00 |
| TC_ESignet_AuthenticateUserNonAuth_01 | Authenticate User with NonAuth Otp with valid details UIN | 00:00:00 |
| OAuthDetailsRequestConsent — Ignored | ||
| ESignet_OAuthDetailsRequest_Consent_Vid_Claim2_all_Valid_Smoke_sid | Oauthdetails request for consent with claim2 and all valid details VID | 00:00:00 |
| ESignet_OAuthDetailsRequest_Consent_Vid_User2_all_Valid_Smoke_sid | Oauthdetails request for user2 with all valid details VID | 00:00:00 |
| ESignet_OAuthDetailsRequest_Consent_Vid_all_Valid_Smoke_sid | Oauthdetails request for consent with all valid details VID | 00:00:00 |
| OAuthDetailsRequestConsent — Passed | ||
| ESignet_OAuthDetailsRequest_Consent_Claim2_all_Valid_Smoke_sid | Oauthdetails request for consent with claim2 and all valid details | 00:00:01 |
| ESignet_OAuthDetailsRequest_Consent_Invalid_Scen_Smoke_sid | Oauthdetails request for consent with invalid scen | 00:00:01 |
| ESignet_OAuthDetailsRequest_Consent_User2_all_Valid_Smoke_sid | Oauthdetails request for user2 with all valid details | 00:00:01 |
| ESignet_OAuthDetailsRequest_Consent_all_Valid_Smoke_sid | Oauthdetails request for consent with all valid details | 00:00:01 |
| ESignet_OAuthDetailsRequest_Consent_all_Valid_authCodeNeg_sid | Oauthdetails request for consent with all valid details | 00:00:01 |
| ESignet_OAuthDetailsRequest_Consent_all_withOnly_OptionalClaim_sid | Oauthdetails request for consent with all valid details | 00:00:01 |
| ESignet_OAuthDetailsRequest_Consent_all_withOnly_OptionalClaim_user2_sid | Oauthdetails request for consent with all valid details | 00:00:01 |
| AuthenticateUserConsent — Ignored | ||
| ESignet_AuthenticateUserIDP_Consent_Vid_Otp_Claim2_Valid_Smoke | Authenticate user consent with otp for claim2 valid details VID | 00:00:00 |
| ESignet_AuthenticateUserIDP_Consent_Vid_Otp_Invalid_IndividualId_Neg | Authenticate user consent Otp with invalid individualId VID | 00:00:00 |
| ESignet_AuthenticateUserIDP_Consent_Vid_Otp_Invalid_TransactionId_Neg | Authenticate user consent Otp with invalid transactionId VID | 00:00:01 |
| ESignet_AuthenticateUserIDP_Consent_Vid_Otp_Valid_Smoke | Authenticate user consent with otp and valid details VID | 00:00:01 |
| ESignet_AuthenticateUserIDP_Consent_Vid_User2_Otp_Valid_Smoke | Authenticate user consent Otp for User2 with valid details UIN | 00:00:00 |
| AuthenticateUserConsent — Passed | ||
| ESignet_AuthenticateUserIDP_Consent_uin_AuthCode | Authenticate user consent with otp and valid details UIN | 00:00:01 |
| ESignet_AuthenticateUserIDP_Consent_uin_AuthCode_OnlyOptionalClaim | Authenticate user consent with otp and valid details UIN | 00:00:01 |
| ESignet_AuthenticateUserIDP_Consent_uin_AuthCode_OnlyOptionalClaim_user2 | Authenticate user consent with otp and valid details UIN | 00:00:01 |
| ESignet_AuthenticateUserIDP_Consent_uin_Otp_Claim2_Valid_Smoke | Authenticate user consent with otp for claim2 valid details UIN | 00:00:01 |
| ESignet_AuthenticateUserIDP_Consent_uin_Otp_Invalid_IndividualId_Neg | Authenticate user consent Otp with invalid individualId UIN | 00:00:01 |
| ESignet_AuthenticateUserIDP_Consent_uin_Otp_Invalid_TransactionId_Neg | Authenticate user consent Otp with invalid transactionId UIN | 00:00:01 |
| ESignet_AuthenticateUserIDP_Consent_uin_Otp_Valid_Smoke | Authenticate user consent with otp and valid details UIN | 00:00:01 |
| ESignet_AuthenticateUserIDP_Consent_uin_User2_Otp_Valid_Smoke | Authenticate user consent Otp for User2 with valid details UIN | 00:00:01 |
| AuthorizationCodeConsent — Ignored | ||
| ESignet_AuthorizationCode_Consent_Vid_All_Valid_Smoke_sid | AuthorizationCode consent with all valid details VID | 00:00:01 |
| ESignet_AuthorizationCode_Consent_Vid_Claim2_All_Valid_Smoke_sid | AuthorizationCode consent with claim2 and all valid details VID | 00:00:00 |
| AuthorizationCodeConsent — Passed | ||
| TC_ESignet_AuthorizationCodeConsent_02 | AuthorizationCode consent without_EssentialClaim | 00:00:01 |
| ESignet_AuthorizationCode_Consent_uin_All_Valid_Smoke_sid | AuthorizationCode consent with all valid details UIN | 00:00:01 |
| ESignet_AuthorizationCode_Consent_uin_Claim2_All_Valid_Smoke_sid | AuthorizationCode consent with claim2 and all valid details UIN | 00:00:01 |
| TC_ESignet_AuthorizationCodeConsent_01 | AuthorizationCode consent with invalid_AcceptedClaim | 00:00:01 |
| TC_ESignet_AuthorizationCodeConsent_06 | AuthorizationCode with only optional claim | 00:00:01 |
| TC_ESignet_AuthorizationCodeConsent_03 | AuthorizationCode with One essential Claim and All OptionalClaim | 00:00:01 |
| TC_ESignet_AuthorizationCodeConsent_04 | AuthorizationCode with onlyEssentialClaim asAcceptedClaim | 00:00:01 |
| TC_ESignet_AuthorizationCodeConsent_05 | AuthorizationCode without essential claim if there is requested essential claim | 00:00:01 |
| TC_ESignet_AuthorizationCodeConsent_07 | AuthorizationCode by not providing any accepted claims if there is no requested essential claims | 00:00:01 |
| GenerateTokenConsent — Ignored | ||
| ESignet_GenerateToken_Consent_Vid_Claim2_Valid_Smoke_sid | Generate token consent with claim2 and valid details VID | 00:00:00 |
| ESignet_GenerateToken_Consent_Vid_Valid_Smoke_sid | Generate token consent with valid details VID | 00:00:01 |
| GenerateTokenConsent — Passed | ||
| ESignet_GenerateToken_Consent_uin_Claim2_Valid_Smoke_sid | Generate token consent with claim2 and valid details UIN | 00:00:01 |
| ESignet_GenerateToken_Consent_uin_Valid_Smoke_sid | Generate token consent with valid details UIN | 00:00:01 |
| GetOidcUserInfoConsent — Ignored | ||
| ESignet_GetOidcUserInfo_Consent_Vid_IdpAccessToken_StatusCode_Claim2_Valid_Smoke_sid | Get OIDC user info consent with claim2 and valid details VID | 00:00:01 |
| ESignet_GetOidcUserInfo_Consent_Vid_IdpAccessToken_StatusCode_Valid_Smoke_sid | Get OIDC user info consent with all valid details VID | 00:00:00 |
| GetOidcUserInfoConsent — Passed | ||
| ESignet_GetOidcUserInfo_Consent_uin_IdpAccessToken_StatusCode_Claim2_Valid_Smoke_sid | Get OIDC user info consent with claim2 and valid details UIN | 00:00:01 |
| ESignet_GetOidcUserInfo_Consent_uin_IdpAccessToken_StatusCode_Valid_Smoke_sid | Get OIDC user info consent with all valid details UIN | 00:00:01 |
| OAuthDetailsRequest — Ignored | ||
| TC_ESignet_OAuthDetailsRequest_06 | Oauthdetails request consent 2nd with all valid details VID | 00:00:00 |
| TC_ESignet_OAuthDetailsRequest_07 | Oauthdetails request sendOtp with all valid details VID | 00:00:01 |
| TC_ESignet_OAuthDetailsRequest_05 | Oauthdetails request with all valid details VID | 00:00:00 |
| OAuthDetailsRequest — Passed | ||
| TC_ESignet_OAuthDetailsRequest_18 | Oauthdetails request 10 with all valid details | 00:00:01 |
| TC_ESignet_OAuthDetailsRequest_19 | Oauthdetails request 11 with all valid details | 00:00:01 |
| TC_ESignet_OAuthDetailsRequest_20 | Oauthdetails request 12 with all valid details | 00:00:01 |
| TC_ESignet_OAuthDetailsRequest_21 | Oauthdetails request 13 with all valid details | 00:00:01 |
| TC_ESignet_OAuthDetailsRequest_22 | Oauthdetails request 14 with all valid details | 00:00:01 |
| TC_ESignet_OAuthDetailsRequest_23 | Oauthdetails request 15 with all valid details | 00:00:01 |
| TC_ESignet_OAuthDetailsRequest_24 | Oauthdetails request 16 with all valid details | 00:00:01 |
| TC_ESignet_OAuthDetailsRequest_25 | Oauthdetails request 17 with all valid details | 00:00:01 |
| TC_ESignet_OAuthDetailsRequest_26 | Oauthdetails request 18 with all valid details | 00:00:01 |
| TC_ESignet_OAuthDetailsRequest_27 | Oauthdetails request 19 with all valid details | 00:00:01 |
| TC_ESignet_OAuthDetailsRequest_28 | Oauthdetails request 20 with all valid details | 00:00:01 |
| TC_ESignet_OAuthDetailsRequest_29 | Oauthdetails request 21 with all valid details | 00:00:01 |
| TC_ESignet_OAuthDetailsRequest_30 | Oauthdetails request 22 with all valid details | 00:00:01 |
| TC_ESignet_OAuthDetailsRequest_31 | Oauthdetails request 23 with all valid details | 00:00:01 |
| TC_ESignet_OAuthDetailsRequest_32 | Oauthdetails request 24 with all valid details | 00:00:01 |
| TC_ESignet_OAuthDetailsRequest_33 | Oauthdetails request 25 with all valid details | 00:00:01 |
| TC_ESignet_OAuthDetailsRequest_34 | Oauthdetails request 2 with all valid details | 00:00:01 |
| TC_ESignet_OAuthDetailsRequest_10 | Oauthdetails request 2 with all valid details | 00:00:01 |
| TC_ESignet_OAuthDetailsRequest_02 | Oauthdetails request 2nd with all valid details | 00:00:01 |
| TC_ESignet_OAuthDetailsRequest_03 | Oauthdetails request 2nd with all valid details VID | 00:00:01 |
| TC_ESignet_OAuthDetailsRequest_11 | Oauthdetails request 3 with all valid details | 00:00:01 |
| TC_ESignet_OAuthDetailsRequest_12 | Oauthdetails request 4 with all valid details | 00:00:01 |
| TC_ESignet_OAuthDetailsRequest_13 | Oauthdetails request 5 with all valid details | 00:00:01 |
| TC_ESignet_OAuthDetailsRequest_14 | Oauthdetails request 6 with all valid details | 00:00:01 |
| TC_ESignet_OAuthDetailsRequest_15 | Oauthdetails request 7 with all valid details | 00:00:01 |
| TC_ESignet_OAuthDetailsRequest_16 | Oauthdetails request 8 with all valid details | 00:00:01 |
| TC_ESignet_OAuthDetailsRequest_17 | Oauthdetails request 9 with all valid details | 00:00:01 |
| TC_ESignet_OAuthDetailsRequest_04 | Oauthdetails request consent 2nd with all valid details | 00:00:01 |
| TC_ESignet_OAuthDetailsRequest_81 | Oauthdetails request with different requestTime | 00:00:01 |
| TC_ESignet_OAuthDetailsRequest_57 | Oauthdetails request with empty value in AcrValues | 00:00:01 |
| TC_ESignet_OAuthDetailsRequest_60 | Oauthdetails request with empty value in Claims | 00:00:01 |
| TC_ESignet_OAuthDetailsRequest_36 | Oauthdetails request with empty value in ClientId | 00:00:01 |
| TC_ESignet_OAuthDetailsRequest_78 | Oauthdetails request with empty value in Nonce | 00:00:01 |
| TC_ESignet_OAuthDetailsRequest_84 | Oauthdetails request with empty value in prompt | 00:00:01 |
| TC_ESignet_OAuthDetailsRequest_46 | Oauthdetails request with empty value in ResponseType | 00:00:01 |
| TC_ESignet_OAuthDetailsRequest_51 | Oauthdetails request with empty value in Scope | 00:00:01 |
| TC_ESignet_OAuthDetailsRequest_73 | Oauthdetails request with empty value in state | 00:00:01 |
| TC_ESignet_OAuthDetailsRequest_64 | Oauthdetails request with empty value in claimsLocales | 00:00:01 |
| TC_ESignet_OAuthDetailsRequest_68 | Oauthdetails request with empty value in display | 00:00:01 |
| TC_ESignet_OAuthDetailsRequest_42 | Oauthdetails request with empty value in redirectUri | 00:00:01 |
| TC_ESignet_OAuthDetailsRequest_39 | Oauthdetails request with exceeding range in ClientId | 00:00:01 |
| TC_ESignet_OAuthDetailsRequest_75 | Oauthdetails request with exceeding range in state | 00:00:01 |
| TC_ESignet_OAuthDetailsRequest_53 | Oauthdetails request with Invalid AcrValues | 00:00:01 |
| TC_ESignet_OAuthDetailsRequest_61 | Oauthdetails request with invalid Claims | 00:00:01 |
| TC_ESignet_OAuthDetailsRequest_35 | Oauthdetails request with Invalid ClientId | 00:00:01 |
| TC_ESignet_OAuthDetailsRequest_54 | Oauthdetails request with Invalid format AcrValues | 00:00:01 |
| TC_ESignet_OAuthDetailsRequest_82 | Oauthdetails request with invalid prompt | 00:00:01 |
| TC_ESignet_OAuthDetailsRequest_38 | Oauthdetails request with Invalid range in ClientId | 00:00:01 |
| TC_ESignet_OAuthDetailsRequest_44 | Oauthdetails request with Invalid ResponseType | 00:00:01 |
| TC_ESignet_OAuthDetailsRequest_48 | Oauthdetails request with Invalid Scope | 00:00:01 |
| TC_ESignet_OAuthDetailsRequest_71 | Oauthdetails request with invalid state | 00:00:01 |
| TC_ESignet_OAuthDetailsRequest_63 | Oauthdetails request with invalid claimsLocales | 00:00:01 |
| TC_ESignet_OAuthDetailsRequest_67 | Oauthdetails request with invalid display | 00:00:01 |
| TC_ESignet_OAuthDetailsRequest_40 | Oauthdetails request with Invalid redirectUri | 00:00:01 |
| TC_ESignet_OAuthDetailsRequest_80 | Oauthdetails request with invalid requestTime | 00:00:01 |
| TC_ESignet_OAuthDetailsRequest_56 | Oauthdetails request without AcrValues | 00:00:01 |
| TC_ESignet_OAuthDetailsRequest_59 | Oauthdetails request without Claims | 00:00:01 |
| TC_ESignet_OAuthDetailsRequest_37 | Oauthdetails request without ClientId | 00:00:01 |
| TC_ESignet_OAuthDetailsRequest_77 | Oauthdetails request without Nonce | 00:00:01 |
| TC_ESignet_OAuthDetailsRequest_83 | Oauthdetails request without prompt | 00:00:01 |
| TC_ESignet_OAuthDetailsRequest_45 | Oauthdetails request without ResponseType | 00:00:01 |
| TC_ESignet_OAuthDetailsRequest_50 | Oauthdetails request without Scope | 00:00:01 |
| TC_ESignet_OAuthDetailsRequest_72 | Oauthdetails request without state | 00:00:01 |
| TC_ESignet_OAuthDetailsRequest_62 | Oauthdetails request without claimsLocales | 00:00:01 |
| TC_ESignet_OAuthDetailsRequest_66 | Oauthdetails request without display | 00:00:01 |
| TC_ESignet_OAuthDetailsRequest_41 | Oauthdetails request without redirectUri | 00:00:01 |
| TC_ESignet_OAuthDetailsRequest_58 | Oauthdetails request with Null in AcrValues | 00:00:01 |
| TC_ESignet_OAuthDetailsRequest_85 | Oauthdetails request with Null in prompt | 00:00:01 |
| TC_ESignet_OAuthDetailsRequest_47 | Oauthdetails request with Null in ResponseType | 00:00:01 |
| TC_ESignet_OAuthDetailsRequest_52 | Oauthdetails request with Null in Scope | 00:00:01 |
| TC_ESignet_OAuthDetailsRequest_74 | Oauthdetails request with Null in state | 00:00:01 |
| TC_ESignet_OAuthDetailsRequest_65 | Oauthdetails request with Null in claimsLocales | 00:00:01 |
| TC_ESignet_OAuthDetailsRequest_69 | Oauthdetails request with Null in display | 00:00:01 |
| TC_ESignet_OAuthDetailsRequest_43 | Oauthdetails request with Null in redirectUri | 00:00:01 |
| TC_ESignet_OAuthDetailsRequest_08 | Oauthdetails request with other valid details | 00:00:01 |
| TC_ESignet_OAuthDetailsRequest_70 | Oauthdetails request with space in display | 00:00:01 |
| TC_ESignet_OAuthDetailsRequest_55 | Oauthdetails request without space in AcrValues | 00:00:01 |
| TC_ESignet_OAuthDetailsRequest_49 | Oauthdetails request without space in Scope | 00:00:01 |
| TC_ESignet_OAuthDetailsRequest_01 | Oauthdetails request with all valid details | 00:00:01 |
| TC_ESignet_OAuthDetailsRequest_88 | Oauthdetails request with all valid details | 00:00:01 |
| TC_ESignet_OAuthDetailsRequest_89 | Oauthdetails request with all valid details | 00:00:01 |
| TC_ESignet_OAuthDetailsRequest_87 | Oauthdetails request with all valid details | 00:00:01 |
| TC_ESignet_OAuthDetailsRequest_86 | Oauthdetails request with space delimited in prompt | 00:00:01 |
| TC_ESignet_OAuthDetailsRequest_09 | Oauthdetails request with other valid details VID | 00:00:01 |
| BioAuthIdp — Ignored | ||
| TC_ESignet_BioAuth_13 | Biometric Face Auth with all valid details VID | 00:00:00 |
| TC_ESignet_BioAuth_01 | Biometric Face Auth with all valid details UIN | 00:00:00 |
| TC_ESignet_BioAuth_24 | Biometric LeftIris Auth with all valid details VID | 00:00:00 |
| TC_ESignet_BioAuth_12 | Biometric LeftIris Auth with all valid details UIN | 00:00:00 |
| TC_ESignet_BioAuth_16 | Biometric LeftLittleFinger Auth with all valid details VID | 00:00:01 |
| TC_ESignet_BioAuth_04 | Biometric LeftLittleFinger Auth with all valid details UIN | 00:00:01 |
| TC_ESignet_BioAuth_15 | Biometric LeftMiddleFinger Auth with all valid details VID | 00:00:00 |
| TC_ESignet_BioAuth_03 | Biometric LeftMiddleFinger Auth with all valid details UIN | 00:00:00 |
| TC_ESignet_BioAuth_21 | Biometric LeftThumb Auth with all valid details VID | 00:00:00 |
| TC_ESignet_BioAuth_09 | Biometric LeftThumb Auth with all valid details UIN | 00:00:00 |
| TC_ESignet_BioAuth_17 | Biometric RightIndexFinger Auth with all valid details VID | 00:00:00 |
| TC_ESignet_BioAuth_05 | Biometric RightIndexFinger Auth with all valid details UIN | 00:00:00 |
| TC_ESignet_BioAuth_23 | Biometric RightIris Auth with all valid details VID | 00:00:00 |
| TC_ESignet_BioAuth_11 | Biometric RightIris Auth with all valid details UIN | 00:00:00 |
| TC_ESignet_BioAuth_20 | Biometric RightLittleFinger Auth with all valid details VID | 00:00:00 |
| TC_ESignet_BioAuth_08 | Biometric RightLittleFinger Auth with all valid details UIN | 00:00:00 |
| TC_ESignet_BioAuth_19 | Biometric RightMiddleFinger Auth with all valid details VID | 00:00:00 |
| TC_ESignet_BioAuth_07 | Biometric RightMiddleFinger Auth with all valid details UIN | 00:00:00 |
| TC_ESignet_BioAuth_18 | Biometric RightRingFinger Auth with all valid details VID | 00:00:00 |
| TC_ESignet_BioAuth_06 | Biometric RightRingFinger Auth with all valid details UIN | 00:00:00 |
| TC_ESignet_BioAuth_22 | Biometric RightThumb Auth with all valid details VID | 00:00:00 |
| TC_ESignet_BioAuth_10 | Biometric RightThumb Auth with all valid details UIN | 00:00:00 |
| TC_ESignet_BioAuth_14 | Biometric RingFinger Auth with all valid details VID | 00:00:00 |
| TC_ESignet_BioAuth_02 | Biometric RingFinger Auth with all valid details UIN | 00:00:00 |
| SendOtp — Ignored | ||
| TC_ESignet_SendOtp_27 | SendOtp with different requestTime VID | 00:00:00 |
| TC_ESignet_SendOtp_43 | SendOtp with empty value in OtpChannels VID | 00:00:00 |
| TC_ESignet_SendOtp_40 | SendOtp with empty value in OtpChannels VID | 00:00:00 |
| TC_ESignet_SendOtp_36 | SendOtp with empty value in individualId VID | 00:00:00 |
| TC_ESignet_SendOtp_32 | SendOtp with empty value in transactionId VID | 00:00:00 |
| TC_ESignet_SendOtp_30 | SendOtp with expired transactionId VID | 00:00:00 |
| TC_ESignet_SendOtp_28 | SendOtp with future requestTime VID | 00:00:00 |
| TC_ESignet_SendOtp_38 | SendOtp with invalid OtpChannels VID | 00:00:00 |
| TC_ESignet_SendOtp_26 | SendOtp with invalid requestTime VID | 00:00:00 |
| TC_ESignet_SendOtp_34 | SendOtp with invalid individualId VID | 00:00:00 |
| TC_ESignet_SendOtp_29 | SendOtp with invalid transactionId VID | 00:00:00 |
| TC_ESignet_SendOtp_42 | SendOtp without OtpChannels VID | 00:00:00 |
| TC_ESignet_SendOtp_39 | SendOtp without OtpChannels VID | 00:00:00 |
| TC_ESignet_SendOtp_35 | SendOtp without individualId VID | 00:00:00 |
| TC_ESignet_SendOtp_31 | SendOtp without transactionId VID | 00:00:00 |
| TC_ESignet_SendOtp_44 | SendOtp with Null in OtpChannels VID | 00:00:00 |
| TC_ESignet_SendOtp_41 | SendOtp with Null in OtpChannels VID | 00:00:00 |
| TC_ESignet_SendOtp_37 | SendOtp with Null in individualId VID | 00:00:00 |
| TC_ESignet_SendOtp_33 | SendOtp with Null in transactionId VID | 00:00:00 |
| TC_ESignet_SendOtp_06 | SendOtp to space separated OtpChannels VID | 00:00:01 |
| TC_ESignet_SendOtp_04 | SendOtp with all valid details VID | 00:00:00 |
| SendOtp — Passed | ||
| TC_ESignet_SendOtp_02 | SendOtp to unregistered email UIN | 00:00:01 |
| TC_ESignet_SendOtp_03 | SendOtp to unregistered Phone UIN | 00:00:01 |
| TC_ESignet_SendOtp_08 | SendOtp with different requestTime UIN | 00:00:01 |
| TC_ESignet_SendOtp_24 | SendOtp with empty value in OtpChannels UIN | 00:00:01 |
| TC_ESignet_SendOtp_21 | SendOtp with empty value in OtpChannels UIN | 00:00:01 |
| TC_ESignet_SendOtp_17 | SendOtp with empty value in individualId UIN | 00:00:01 |
| TC_ESignet_SendOtp_13 | SendOtp with empty value in transactionId UIN | 00:00:01 |
| TC_ESignet_SendOtp_11 | SendOtp with expired transactionId UIN | 00:00:01 |
| TC_ESignet_SendOtp_09 | SendOtp with future requestTime UIN | 00:00:01 |
| TC_ESignet_SendOtp_19 | SendOtp to invalid OtpChannels UIN | 00:00:01 |
| TC_ESignet_SendOtp_07 | SendOtp with invalid requestTime UIN | 00:00:01 |
| TC_ESignet_SendOtp_15 | SendOtp with invalid individualId UIN | 00:00:01 |
| TC_ESignet_SendOtp_10 | SendOtp with invalid transactionId UIN | 00:00:01 |
| TC_ESignet_SendOtp_23 | SendOtp without OtpChannels UIN | 00:00:01 |
| TC_ESignet_SendOtp_20 | SendOtp without OtpChannels UIN | 00:00:01 |
| TC_ESignet_SendOtp_16 | SendOtp without individualId UIN | 00:00:01 |
| TC_ESignet_SendOtp_12 | SendOtp without transactionId UIN | 00:00:01 |
| TC_ESignet_SendOtp_25 | SendOtp with Null in OtpChannels UIN | 00:00:01 |
| TC_ESignet_SendOtp_22 | SendOtp with Null in OtpChannels UIN | 00:00:01 |
| TC_ESignet_SendOtp_18 | SendOtp with Null in individualId UIN | 00:00:01 |
| TC_ESignet_SendOtp_14 | SendOtp with Null in transactionId UIN | 00:00:01 |
| TC_ESignet_SendOtp_05 | SendOtp to space separated OtpChannels UIN | 00:00:01 |
| TC_ESignet_SendOtp_01 | SendOtp with all valid details UIN | 00:00:01 |
| AuthenticateUser — Ignored | ||
| TC_ESignet_AuthenticateUser_06 | Authenticate user consent Otp with same claims VID | 00:00:00 |
| TC_ESignet_AuthenticateUser_07 | Authenticate user Otp with invalid VID | 00:00:00 |
| TC_ESignet_AuthenticateUser_05 | Authenticate user with valid details VID | 00:00:00 |
| TC_ESignet_AuthenticateUser_32 | Send authentication request with unauthenticated transactionId VID | 00:00:00 |
| TC_ESignet_AuthenticateUser_04 | Authenticate user with 2nd Otp and valid details VID | 00:00:00 |
| TC_ESignet_AuthenticateUser_49 | Authenticate user with different AuthFactorType VID | 00:00:00 |
| TC_ESignet_AuthenticateUser_34 | Authenticate user with different requestTime VID | 00:00:00 |
| TC_ESignet_AuthenticateUser_47 | Authenticate user with empty value in AuthFactorType VID | 00:00:00 |
| TC_ESignet_AuthenticateUser_52 | Authenticate user with empty value in challenge VID | 00:00:00 |
| TC_ESignet_AuthenticateUser_43 | Authenticate user with empty value in individualId VID | 00:00:00 |
| TC_ESignet_AuthenticateUser_39 | Authenticate user with empty value in transactionId VID | 00:00:00 |
| TC_ESignet_AuthenticateUser_37 | Authenticate user with expired transactionId VID | 00:00:00 |
| TC_ESignet_AuthenticateUser_35 | Authenticate user with future requestTime VID | 00:00:00 |
| TC_ESignet_AuthenticateUser_45 | Authenticate user with invalid AuthFactorType VID | 00:00:00 |
| TC_ESignet_AuthenticateUser_50 | Authenticate user with invalid challenge VID | 00:00:00 |
| TC_ESignet_AuthenticateUser_41 | Authenticate user with invalid individualId VID | 00:00:00 |
| TC_ESignet_AuthenticateUser_54 | Authenticate user with invalid Otp challenge VID | 00:00:00 |
| TC_ESignet_AuthenticateUser_33 | Authenticate user with invalid requestTime VID | 00:00:00 |
| TC_ESignet_AuthenticateUser_36 | Authenticate user with invalid transactionId VID | 00:00:00 |
| TC_ESignet_AuthenticateUser_46 | Authenticate user without AuthFactorType VID | 00:00:00 |
| TC_ESignet_AuthenticateUser_51 | Authenticate user without challenge VID | 00:00:00 |
| TC_ESignet_AuthenticateUser_42 | Authenticate user without individualId VID | 00:00:00 |
| TC_ESignet_AuthenticateUser_38 | Authenticate user without transactionId VID | 00:00:00 |
| TC_ESignet_AuthenticateUser_48 | Authenticate user with Null in AuthFactorType VID | 00:00:00 |
| TC_ESignet_AuthenticateUser_53 | Authenticate user with Null in challenge VID | 00:00:00 |
| TC_ESignet_AuthenticateUser_44 | Authenticate user with Null in individualId VID | 00:00:00 |
| TC_ESignet_AuthenticateUser_40 | Authenticate user with Null in transactionId VID | 00:00:00 |
| AuthenticateUser — Passed | ||
| TC_ESignet_AuthenticateUser_03 | Authenticate user consent with Otp and same claims UIN | 00:00:01 |
| TC_ESignet_AuthenticateUser_08 | Send authenticate request with unauthenticated transactionId UIN | 00:00:01 |
| TC_ESignet_AuthenticateUser_02 | Authenticate user with 2nd Otp UIN | 00:00:01 |
| TC_ESignet_AuthenticateUser_25 | Authenticate user with different AuthFactorType UIN | 00:00:01 |
| TC_ESignet_AuthenticateUser_10 | Authenticate user with different requestTime UIN | 00:00:01 |
| TC_ESignet_AuthenticateUser_23 | Authenticate user with empty value in AuthFactorType UIN | 00:00:01 |
| TC_ESignet_AuthenticateUser_28 | Authenticate user with empty value in challenge UIN | 00:00:01 |
| TC_ESignet_AuthenticateUser_19 | Authenticate user with empty value in individualId UIN | 00:00:01 |
| TC_ESignet_AuthenticateUser_15 | Authenticate user with empty value in transactionId UIN | 00:00:01 |
| TC_ESignet_AuthenticateUser_13 | Authenticate user with expired transactionId UIN | 00:00:01 |
| TC_ESignet_AuthenticateUser_11 | Authenticate user with future requestTime UIN | 00:00:01 |
| TC_ESignet_AuthenticateUser_21 | Authenticate user with invalid AuthFactorType UIN | 00:00:01 |
| TC_ESignet_AuthenticateUser_26 | Authenticate user with invalid challenge UIN | 00:00:01 |
| TC_ESignet_AuthenticateUser_17 | Authenticate user with invalid individualId UIN | 00:00:01 |
| TC_ESignet_AuthenticateUser_30 | Authenticate user with invalid Otp challenge UIN | 00:00:01 |
| TC_ESignet_AuthenticateUser_09 | Authenticate user with invalid requestTime UIN | 00:00:01 |
| TC_ESignet_AuthenticateUser_12 | Authenticate user with invalid transactionId UIN | 00:00:01 |
| TC_ESignet_AuthenticateUser_22 | Authenticate user without AuthFactorType UIN | 00:00:01 |
| TC_ESignet_AuthenticateUser_27 | Authenticate user without challenge UIN | 00:00:01 |
| TC_ESignet_AuthenticateUser_18 | Authenticate user without individualId UIN | 00:00:01 |
| TC_ESignet_AuthenticateUser_14 | Authenticate user without transactionId UIN | 00:00:01 |
| TC_ESignet_AuthenticateUser_24 | Authenticate user with Null in AuthFactorType UIN | 00:00:01 |
| TC_ESignet_AuthenticateUser_29 | Authenticate user with Null in challenge UIN | 00:00:01 |
| TC_ESignet_AuthenticateUser_20 | Authenticate user with Null in individualId UIN | 00:00:01 |
| TC_ESignet_AuthenticateUser_16 | Authenticate user with Null in transactionId UIN | 00:00:01 |
| TC_ESignet_AuthenticateUser_31 | Authenticate user with other Otp valid details UIN | 00:00:01 |
| TC_ESignet_AuthenticateUser_01 | Authenticate user with Otp UIN | 00:00:01 |
| TC_ESignet_AuthenticateUser_55 | Authenticate user with Otp UIN | 00:00:01 |
| TC_ESignet_AuthenticateUser_56 | Authenticate user with Otp UIN | 00:00:01 |
| TC_ESignet_AuthenticateUser_57 | Authenticate user with Otp UIN | 00:00:01 |
| AuthorizationCode — Ignored | ||
| TC_ESignet_AuthorizationCode_17 | Authorization code request with all valid details VID | 00:00:00 |
| TC_ESignet_AuthorizationCode_31 | Authorization code request with different requestTime VID | 00:00:00 |
| TC_ESignet_AuthorizationCode_23 | Authorization code request with empty value in PermittedAuthorizeScopes VID | 00:00:00 |
| TC_ESignet_AuthorizationCode_20 | Authorization code request with empty value in transactionId VID | 00:00:00 |
| TC_ESignet_AuthorizationCode_28 | Authorization code request with empty accepted claims VID | 00:00:00 |
| TC_ESignet_AuthorizationCode_22 | Authorization code request with expired transactionId VID | 00:00:00 |
| TC_ESignet_AuthorizationCode_32 | Authorization code request with future requestTime VID | 00:00:00 |
| TC_ESignet_AuthorizationCode_24 | Authorization code request with invalid PermittedAuthorizeScopes VID | 00:00:00 |
| TC_ESignet_AuthorizationCode_18 | Authorization code request with invalid transactionId VID | 00:00:01 |
| TC_ESignet_AuthorizationCode_26 | Authorization code request with invalid accepted claims VID | 00:00:00 |
| TC_ESignet_AuthorizationCode_30 | Authorization code request with invalid requestTime VID | 00:00:01 |
| TC_ESignet_AuthorizationCode_27 | Authorization code request without claims VID | 00:00:00 |
| TC_ESignet_AuthorizationCode_19 | Authorization code request without transactionId VID | 00:00:00 |
| TC_ESignet_AuthorizationCode_25 | Authorization code request with Null in PermittedAuthorizeScopes VID | 00:00:00 |
| TC_ESignet_AuthorizationCode_21 | Authorization code request with Null in transactionId VID | 00:00:00 |
| TC_ESignet_AuthorizationCode_29 | Authorization code request with Null in accepted claims VID | 00:00:00 |
| AuthorizationCode — Passed | ||
| TC_ESignet_AuthorizationCode_01 | Authorization code request with all valid details UIN | 00:00:01 |
| TC_ESignet_AuthorizationCode_35 | Authorization code request with only accepted claim | 00:00:01 |
| TC_ESignet_AuthorizationCode_36 | Authorization code by providing only optional claim provided only optional claims are part of requested claim | 00:00:01 |
| TC_ESignet_AuthorizationCode_37 | Authorization code by not providing any accepted claims provided there is no requested essential claims | 00:00:01 |
| TC_ESignet_AuthorizationCode_15 | Authorization code request with different requestTime UIN | 00:00:01 |
| TC_ESignet_AuthorizationCode_07 | Authorization code request with empty PermittedAuthorizeScopes UIN | 00:00:01 |
| TC_ESignet_AuthorizationCode_04 | Authorization code request with empty value in transactionId UIN | 00:00:01 |
| TC_ESignet_AuthorizationCode_12 | Authorization code request with empty accepted claims UIN | 00:00:01 |
| TC_ESignet_AuthorizationCode_06 | Authorization code request with expired transactionId UIN | 00:00:01 |
| TC_ESignet_AuthorizationCode_16 | Authorization code request with future requestTime UIN | 00:00:01 |
| TC_ESignet_AuthorizationCode_08 | Authorization code request with invalid PermittedAuthorizeScopes UIN | 00:00:01 |
| TC_ESignet_AuthorizationCode_02 | Authorization code request with invalid transactionId UIN | 00:00:01 |
| TC_ESignet_AuthorizationCode_10 | Authorization code request with invalid accepted claims UIN | 00:00:01 |
| TC_ESignet_AuthorizationCode_14 | Authorization code request with invalid requestTime UIN | 00:00:01 |
| TC_ESignet_AuthorizationCode_11 | Authorization code request without claims UIN | 00:00:01 |
| TC_ESignet_AuthorizationCode_03 | Authorization code request without transactionId UIN | 00:00:01 |
| TC_ESignet_AuthorizationCode_09 | Authorization code request with Null in PermittedAuthorizeScopes UIN | 00:00:01 |
| TC_ESignet_AuthorizationCode_05 | Authorization code request with Null in transactionId UIN | 00:00:01 |
| TC_ESignet_AuthorizationCode_13 | Authorization code request with Null in accepted claims UIN | 00:00:01 |
| TC_ESignet_AuthorizationCode_34 | Authorization code request with essential claim and optional Claims | 00:00:01 |
| TC_ESignet_AuthorizationCode_33 | Authorization code request without essential claim | 00:00:01 |
| GenerateToken — Ignored | ||
| TC_ESignet_GenerateToken_54 | Generate token with empty value in ClientAssertionType VID | 00:00:00 |
| TC_ESignet_GenerateToken_61 | Generate token with empty value in ClientAssertion VID | 00:00:00 |
| TC_ESignet_GenerateToken_36 | Generate token with empty value in ClientId VID | 00:00:00 |
| TC_ESignet_GenerateToken_45 | Generate token with empty value in code VID | 00:00:00 |
| TC_ESignet_GenerateToken_39 | Generate token with empty value in grant_type VID | 00:00:00 |
| TC_ESignet_GenerateToken_50 | Generate token with empty value in redirect uri VID | 00:00:00 |
| TC_ESignet_GenerateToken_52 | Generate token with incorrect ClientAssertionType VID | 00:00:00 |
| TC_ESignet_GenerateToken_58 | Generate token with invalid ClientAssertionType VID | 00:00:00 |
| TC_ESignet_GenerateToken_59 | Generate token with invalid ClientAssertion VID | 00:00:00 |
| TC_ESignet_GenerateToken_33 | Generate token with invalid ClientId VID | 00:00:00 |
| TC_ESignet_GenerateToken_43 | Generate token with invalid code VID | 00:00:00 |
| TC_ESignet_GenerateToken_37 | Generate token with invalid grant_type VID | 00:00:00 |
| TC_ESignet_GenerateToken_48 | Generate token with invalid redirect uri VID | 00:00:00 |
| TC_ESignet_GenerateToken_53 | Generate token without ClientAssertionType VID | 00:00:00 |
| TC_ESignet_GenerateToken_60 | Generate token without ClientAssertion VID | 00:00:00 |
| TC_ESignet_GenerateToken_34 | Generate token without ClientId VID | 00:00:00 |
| TC_ESignet_GenerateToken_44 | Generate token without code VID | 00:00:00 |
| TC_ESignet_GenerateToken_38 | Generate token without grant_type VID | 00:00:00 |
| TC_ESignet_GenerateToken_49 | Generate token without redirect uri VID | 00:00:00 |
| TC_ESignet_GenerateToken_55 | Generate token with Null in ClientAssertionType VID | 00:00:00 |
| TC_ESignet_GenerateToken_62 | Generate token with Null in ClientAssertion VID | 00:00:00 |
| TC_ESignet_GenerateToken_35 | Generate token with Null in ClientId VID | 00:00:00 |
| TC_ESignet_GenerateToken_46 | Generate token with Null in code VID | 00:00:00 |
| TC_ESignet_GenerateToken_40 | Generate token with Null in grant_type VID | 00:00:00 |
| TC_ESignet_GenerateToken_51 | Generate token with Null in redirect uri VID | 00:00:00 |
| TC_ESignet_GenerateToken_56 | Generate token with space in the beginning of ClientAssertionType VID | 00:00:00 |
| TC_ESignet_GenerateToken_41 | Generate token with space in the beginning of grant_type VID | 00:00:00 |
| TC_ESignet_GenerateToken_57 | Generate token with space in the end of ClientAssertionType VID | 00:00:00 |
| TC_ESignet_GenerateToken_42 | Generate token with space in the end of grant_type VID | 00:00:00 |
| TC_ESignet_GenerateToken_47 | Generate token with used code VID | 00:00:00 |
| TC_ESignet_GenerateToken_32 | Generate token with all valid details VID | 00:00:00 |
| GenerateToken — Passed | ||
| TC_ESignet_GenerateToken_23 | Generate token with empty value in client assertion type UIN | 00:00:01 |
| TC_ESignet_GenerateToken_30 | Generate token with empty value in client assertion UIN | 00:00:01 |
| TC_ESignet_GenerateToken_05 | Generate token with empty value in ClientId UIN | 00:00:01 |
| TC_ESignet_GenerateToken_14 | Generate token with empty value in code UIN | 00:00:01 |
| TC_ESignet_GenerateToken_08 | Generate token with empty grant_type UIN | 00:00:01 |
| TC_ESignet_GenerateToken_19 | Generate token with empty value in redirect uri UIN | 00:00:01 |
| TC_ESignet_GenerateToken_21 | Generate token with incorrect client assertion type UIN | 00:00:01 |
| TC_ESignet_GenerateToken_27 | Generate token with invalid client assertion type UIN | 00:00:01 |
| TC_ESignet_GenerateToken_28 | Generate token with invalid client assertion UIN | 00:00:01 |
| TC_ESignet_GenerateToken_02 | Generate token with invalid ClientId UIN | 00:00:01 |
| TC_ESignet_GenerateToken_12 | Generate token with invalid code UIN | 00:00:01 |
| TC_ESignet_GenerateToken_06 | Generate token with invalid grant_type UIN | 00:00:01 |
| TC_ESignet_GenerateToken_17 | Generate token with invalid redirect uri UIN | 00:00:01 |
| TC_ESignet_GenerateToken_22 | Generate token without client assertion type UIN | 00:00:01 |
| TC_ESignet_GenerateToken_29 | Generate token without client assertion UIN | 00:00:01 |
| TC_ESignet_GenerateToken_03 | Generate token without ClientId UIN | 00:00:01 |
| TC_ESignet_GenerateToken_13 | Generate token without code UIN | 00:00:01 |
| TC_ESignet_GenerateToken_07 | Generate token without grant_type UIN | 00:00:01 |
| TC_ESignet_GenerateToken_18 | Generate token without redirect uri UIN | 00:00:01 |
| TC_ESignet_GenerateToken_24 | Generate token with Null in client assertion type UIN | 00:00:01 |
| TC_ESignet_GenerateToken_31 | Generate token with Null in client assertion UIN | 00:00:01 |
| TC_ESignet_GenerateToken_04 | Generate token with Null in ClientId UIN | 00:00:01 |
| TC_ESignet_GenerateToken_15 | Generate token with Null in code UIN | 00:00:01 |
| TC_ESignet_GenerateToken_09 | Generate token with Null in grant_type UIN | 00:00:01 |
| TC_ESignet_GenerateToken_20 | Generate token with Null in redirect uri UIN | 00:00:01 |
| TC_ESignet_GenerateToken_25 | Generate token with space in the beginning of client assertion type UIN | 00:00:01 |
| TC_ESignet_GenerateToken_10 | Generate token with space in the beginning of grant_type UIN | 00:00:01 |
| TC_ESignet_GenerateToken_26 | Generate token with space in the end of client assertion type UIN | 00:00:01 |
| TC_ESignet_GenerateToken_11 | Generate token with space in the end of grant_type UIN | 00:00:01 |
| TC_ESignet_GenerateToken_16 | Generate token with used code UIN | 00:00:01 |
| TC_ESignet_GenerateToken_01 | Generate token with all valid details UIN | 00:00:01 |
| GetOidcUserInfo — Ignored | ||
| TC_ESignet_GetOidcUserInfo_04 | Get OIDC user info with invalid token VID | 00:00:00 |
| TC_ESignet_GetOidcUserInfo_02 | Get OIDC user info with all valid details VID | 00:00:00 |
| GetOidcUserInfo — Passed | ||
| TC_ESignet_GetOidcUserInfo_03 | Get OIDC user info with invalid token UIN | 00:00:01 |
| TC_ESignet_GetOidcUserInfo_01 | Get OIDC user info with all valid details UIN | 00:00:01 |
| CreateOIDCClient — Ignored | ||
| TC_ESignet_CreateOIDCClient_06 | To create OIDC Client with different invalid token | 00:00:00 |
| CreateOIDCClient — Passed | ||
| TC_ESignet_CreateOIDCClient_02 | To create OIDC Client with two same relying party | 00:00:01 |
| TC_ESignet_CreateOIDCClient_04 | To create OIDC Client with different requestTime | 00:00:01 |
| TC_ESignet_CreateOIDCClient_22 | To create OIDC Client with missing authContextRefs | 00:00:01 |
| TC_ESignet_CreateOIDCClient_31 | To create OIDC Client with an empty clientAuthMethods | 00:00:01 |
| TC_ESignet_CreateOIDCClient_28 | To create OIDC Client with an empty grantTypes | 00:00:01 |
| TC_ESignet_CreateOIDCClient_08 | To create OIDC Client with exceding range clientId | 00:00:01 |
| TC_ESignet_CreateOIDCClient_10 | To create OIDC Client with exceding range clientName | 00:00:01 |
| TC_ESignet_CreateOIDCClient_17 | To create OIDC Client with exceding range logoUri | 00:00:01 |
| TC_ESignet_CreateOIDCClient_15 | To create OIDC Client with exceding range relyingpartyId | 00:00:01 |
| TC_ESignet_CreateOIDCClient_07 | To create OIDC Client with invalid range clientId | 00:00:01 |
| TC_ESignet_CreateOIDCClient_09 | To create OIDC Client with invalid range clientName | 00:00:01 |
| TC_ESignet_CreateOIDCClient_16 | To create OIDC Client with invalid range logoUri | 00:00:01 |
| TC_ESignet_CreateOIDCClient_14 | To create OIDC Client with invalid range relyingpartyId | 00:00:01 |
| TC_ESignet_CreateOIDCClient_03 | To create OIDC Client with invalid requestTime and all valid data | 00:00:01 |
| TC_ESignet_CreateOIDCClient_11 | To create OIDC Client with a value starting with space in clientId | 00:00:01 |
| TC_ESignet_CreateOIDCClient_12 | To create OIDC Client with a value ending with space in clientId | 00:00:01 |
| TC_ESignet_CreateOIDCClient_13 | To create OIDC Client with clientId value having space in middle | 00:00:01 |
| TC_ESignet_CreateOIDCClient_24 | To create OIDC Client with invalid userClaims | 00:00:01 |
| TC_ESignet_CreateOIDCClient_19 | To create OIDC Client with invaid authContextRefs | 00:00:01 |
| TC_ESignet_CreateOIDCClient_30 | To create OIDC Client with different invalid clientAuthMethods | 00:00:01 |
| TC_ESignet_CreateOIDCClient_27 | To create OIDC Client with different invalid grantTypes | 00:00:01 |
| TC_ESignet_CreateOIDCClient_23 | To create OIDC Client with invalid publicKey | 00:00:01 |
| TC_ESignet_CreateOIDCClient_21 | To create OIDC Client with missing authContextRefs | 00:00:01 |
| TC_ESignet_CreateOIDCClient_29 | To create OIDC Client with missing clientAuthMethods | 00:00:01 |
| TC_ESignet_CreateOIDCClient_25 | To create OIDC Client with missing grantTypes | 00:00:01 |
| TC_ESignet_CreateOIDCClient_18 | To create OIDC Client with with missing redirectUris | 00:00:01 |
| TC_ESignet_CreateOIDCClient_20 | To create OIDC Client with null value in authContextRefs | 00:00:01 |
| TC_ESignet_CreateOIDCClient_32 | To create OIDC Client with null value in clientAuthMethods | 00:00:01 |
| TC_ESignet_CreateOIDCClient_26 | To create OIDC Client with null value in grantTypes | 00:00:01 |
| TC_ESignet_CreateOIDCClient_05 | To create OIDC Client with invalid token | 00:00:01 |
| TC_ESignet_CreateOIDCClient_01 | To create OIDC Client with all valid data | 00:00:01 |
| UpdateOIDCClient — Ignored | ||
| TC_ESignet_UpdateOIDCClient_07 | To update OIDC client with different invalid token | 00:00:00 |
| UpdateOIDCClient — Passed | ||
| TC_ESignet_UpdateOIDCClient_02 | To update OIDC client with different valid data | 00:00:01 |
| TC_ESignet_UpdateOIDCClient_04 | To update OIDC client with different invalid requestTime | 00:00:01 |
| TC_ESignet_UpdateOIDCClient_17 | To update OIDC client with an empty authContextRefs | 00:00:01 |
| TC_ESignet_UpdateOIDCClient_26 | To update OIDC client with empty clientAuthMethods | 00:00:01 |
| TC_ESignet_UpdateOIDCClient_22 | To update OIDC client with an empty grantTypes | 00:00:01 |
| TC_ESignet_UpdateOIDCClient_13 | To update OIDC client with an empty redirectUris | 00:00:01 |
| TC_ESignet_UpdateOIDCClient_09 | To update OIDC client with exceding range clientId | 00:00:01 |
| TC_ESignet_UpdateOIDCClient_29 | To update OIDC client with exceding range clientName | 00:00:01 |
| TC_ESignet_UpdateOIDCClient_12 | To update OIDC client with exceding range logoUri | 00:00:01 |
| TC_ESignet_UpdateOIDCClient_08 | To update OIDC client with invalid range | 00:00:01 |
| TC_ESignet_UpdateOIDCClient_28 | To update OIDC client with all invalid range clientName | 00:00:01 |
| TC_ESignet_UpdateOIDCClient_11 | To update OIDC client with invalid range logoUri | 00:00:01 |
| TC_ESignet_UpdateOIDCClient_03 | To update OIDC client with invalid requestTime | 00:00:01 |
| TC_ESignet_UpdateOIDCClient_16 | To update OIDC client with invalid authContextRefs | 00:00:01 |
| TC_ESignet_UpdateOIDCClient_24 | To update OIDC client with invalid clientAuthMethods | 00:00:01 |
| TC_ESignet_UpdateOIDCClient_05 | To update OIDC client with invalid clientId | 00:00:01 |
| TC_ESignet_UpdateOIDCClient_20 | To update OIDC client with invalid grantTypes | 00:00:01 |
| TC_ESignet_UpdateOIDCClient_10 | To update OIDC client with invalid status | 00:00:01 |
| TC_ESignet_UpdateOIDCClient_15 | To update OIDC client with invalid userClaims | 00:00:01 |
| TC_ESignet_UpdateOIDCClient_19 | To update OIDC client with missing authContextRefs | 00:00:01 |
| TC_ESignet_UpdateOIDCClient_27 | To update OIDC client with missing clientAuthMethods | 00:00:01 |
| TC_ESignet_UpdateOIDCClient_23 | To update OIDC client with missing grantTypes | 00:00:01 |
| TC_ESignet_UpdateOIDCClient_14 | To update OIDC client with missing redirectUris | 00:00:01 |
| TC_ESignet_UpdateOIDCClient_18 | To update OIDC client with null authContextRefs | 00:00:01 |
| TC_ESignet_UpdateOIDCClient_25 | To update OIDC client with null value in clientAuthMethods | 00:00:01 |
| TC_ESignet_UpdateOIDCClient_21 | To update OIDC client with null grantTypes | 00:00:01 |
| TC_ESignet_UpdateOIDCClient_06 | To update OIDC client with invalid token | 00:00:01 |
| TC_ESignet_UpdateOIDCClient_01 | To update OIDC client with all valid data | 00:00:01 |
| CreateOIDCClientV2 — Passed | ||
| TC_ESignet_CreateOIDCClientV2_04 | To create OIDC Client V2 with invalid clientNameLang | 00:00:01 |
| TC_ESignet_CreateOIDCClientV2_03 | To create OIDC Client V2 with invalid language code | 00:00:01 |
| TC_ESignet_CreateOIDCClientV2_02 | To create OIDC Client V2 with invalid language code size | 00:00:01 |
| TC_ESignet_CreateOIDCClientV2_06 | To create OIDC Client V2 with missing ClientNamelangMap | 00:00:01 |
| TC_ESignet_CreateOIDCClientV2_05 | To create OIDC Client V2 with missing clientNameLangMap value | 00:00:01 |
| TC_ESignet_CreateOIDCClientV2_01 | To create OIDC Client V2 with all valid data | 00:00:01 |
| UpdateOIDCClientV2 — Passed | ||
| TC_ESignet_UpdateOIDCClientV2_02 | To update OIDC Client V2 with invalid clientNameLang | 00:00:01 |
| TC_ESignet_UpdateOIDCClientV2_04 | To update OIDC Client V2 with invalid language code | 00:00:01 |
| TC_ESignet_UpdateOIDCClientV2_03 | To update OIDC Client V2 with invalid language code size | 00:00:01 |
| TC_ESignet_UpdateOIDCClientV2_06 | To update OIDC Client V2 with missing clientNamelangMap | 00:00:01 |
| TC_ESignet_UpdateOIDCClientV2_05 | To update OIDC Client V2 with missing clientNamelangMap value | 00:00:01 |
| TC_ESignet_UpdateOIDCClientV2_01 | To update OIDC Client V2 with all valid data | 00:00:01 |
| OAuthDetailsRequestV2 — Passed | ||
| TC_ESignet_OAuthDetailsRequestV2_02 | To get OAuthDetails V2 with first language and all valid data | 00:00:01 |
| TC_ESignet_OAuthDetailsRequestV2_01 | To get OAuthDetails V2 with all valid data | 00:00:01 |
| CreatePolicySunBirdR — Ignored | ||
| TC_ESignet_CreatePolicySunBirdR_01 | To create a Policy for SunBirdR with all valid data and with no authorization | 00:00:00 |
| GetPolicySunBirdR — Ignored | ||
| TC_ESignet_GetPolicySunBirdR_01 | To delete policy for SunBirdR with no authorization | 00:00:00 |
| SearchPolicySunBirdR — Ignored | ||
| TC_ESignet_SearchPolicySunBirdR_01 | To Search for the Policy with the policynumber and with no Authorization | 00:00:00 |
| CreateOIDCClientV2SunBirdC — Ignored | ||
| TC_ESignet_CreateOIDCClientV2SunBirdC_01 | To create OIDCClientV2 for SunbirdC with all valid data | 00:00:01 |
| OAuthDetailsRequestSunBirdC — Ignored | ||
| TC_ESignet_OAuthDetailsRequestSunBirdC_01 | To Request OAuthDetails for SunBirdC with all valid data | 00:00:01 |
| AuthenticateUserSunBirdC — Ignored | ||
| TC_ESignet_AuthenticateUserSunBirdC_01 | To Authenticate the User for SunBirdC with all valid data | 00:00:01 |
| AuthorizationCodeSunBirdC — Ignored | ||
| TC_ESignet_AuthorizationCodeSunBirdC_01 | To Authorize the user for SunBirdC with all valid data | 00:00:01 |
| GenerateTokenSunBirdC — Ignored | ||
| TC_ESignet_GenerateTokenSunBirdC_01 | To Generate token for SunBirdC with all valid data | 00:00:00 |
| OAuthDetailsRequestSunBirdCNegTC — Ignored | ||
| TC_ESignet_OAuthDetailsRequestSunBirdCNegTC_21 | To request OAuthDetails for SunBirdC with valid AuthCode | 00:00:01 |
| TC_ESignet_OAuthDetailsRequestSunBirdCNegTC_15 | To request OAuthDetails for SunBirdC with valid data | 00:00:01 |
| TC_ESignet_OAuthDetailsRequestSunBirdCNegTC_22 | To request OAuthDetails for SunBirdC with different different valid AuthCode | 00:00:01 |
| TC_ESignet_OAuthDetailsRequestSunBirdCNegTC_16 | To request OAuthDetails for SunBirdC with different valid data | 00:00:01 |
| TC_ESignet_OAuthDetailsRequestSunBirdCNegTC_23 | To request OAuthDetails for SunBirdC with different valid AuthCode | 00:00:01 |
| TC_ESignet_OAuthDetailsRequestSunBirdCNegTC_17 | To request OAuthDetails for SunBirdC with different valid data | 00:00:01 |
| TC_ESignet_OAuthDetailsRequestSunBirdCNegTC_24 | To request OAuthDetails for SunBirdC with different valid Authcode | 00:00:01 |
| TC_ESignet_OAuthDetailsRequestSunBirdCNegTC_18 | To request OAuthDetails for SunBirdC with different valid data | 00:00:01 |
| TC_ESignet_OAuthDetailsRequestSunBirdCNegTC_25 | To request OAuthDetails for SunBirdC with different valid data | 00:00:01 |
| TC_ESignet_OAuthDetailsRequestSunBirdCNegTC_19 | To request OAuthDetails for SunBirdC with different valid data | 00:00:01 |
| TC_ESignet_OAuthDetailsRequestSunBirdCNegTC_26 | To request OAuthDetails for SunBirdC with different valid data | 00:00:01 |
| TC_ESignet_OAuthDetailsRequestSunBirdCNegTC_20 | To request OAuthDetails for SunBirdC with different valid data | 00:00:01 |
| TC_ESignet_OAuthDetailsRequestSunBirdCNegTC_27 | To request OAuthDetails for SunBirdC with different valid data | 00:00:01 |
| TC_ESignet_OAuthDetailsRequestSunBirdCNegTC_28 | To request OAuthDetails for SunBirdC with different valid data | 00:00:01 |
| TC_ESignet_OAuthDetailsRequestSunBirdCNegTC_14 | To request OAuthDetails for SunBirdC with valid data | 00:00:01 |
| TC_ESignet_OAuthDetailsRequestSunBirdCNegTC_13 | To request OAuthDetails for SunBirdC with only challenge method | 00:00:01 |
| TC_ESignet_OAuthDetailsRequestSunBirdCNegTC_12 | To request OAuthDetails for SunBirdC with only codeChallenge with scope | 00:00:01 |
| TC_ESignet_OAuthDetailsRequestSunBirdCNegTC_01 | To request OAuthDetails for SunBirdC with all valid dataand with other acrs | 00:00:01 |
| TC_ESignet_OAuthDetailsRequestSunBirdCNegTC_09 | To request OAuthDetails for SunBirdC with an empty codeChallenge data | 00:00:01 |
| TC_ESignet_OAuthDetailsRequestSunBirdCNegTC_08 | To request OAuthDetails for SunBirdC with invalid codeChallengeMethod | 00:00:01 |
| TC_ESignet_OAuthDetailsRequestSunBirdCNegTC_04 | To request OAuthDetails for SunBirdC with invalid scope value | 00:00:01 |
| TC_ESignet_OAuthDetailsRequestSunBirdCNegTC_10 | To request OAuthDetails for SunBirdC with lenghty codeChallenge data | 00:00:01 |
| TC_ESignet_OAuthDetailsRequestSunBirdCNegTC_05 | To request OAuthDetails for SunBirdC with openid scope data | 00:00:01 |
| TC_ESignet_OAuthDetailsRequestSunBirdCNegTC_06 | To request OAuthDetails for SunBirdC with openid profile sunbird value in scope | 00:00:01 |
| TC_ESignet_OAuthDetailsRequestSunBirdCNegTC_07 | To request OAuthDetails for SunBirdC with random codeChallenge data | 00:00:01 |
| TC_ESignet_OAuthDetailsRequestSunBirdCNegTC_11 | To request OAuthDetails for SunBirdC with sunbirdc scope | 00:00:01 |
| TC_ESignet_OAuthDetailsRequestSunBirdCNegTC_02 | To request OAuthDetails for SunBirdC with all valid data and without scope | 00:00:01 |
| TC_ESignet_OAuthDetailsRequestSunBirdCNegTC_03 | To request OAuthDetails for SunBirdC with all valid data and without scope data | 00:00:01 |
| AuthenticateUserSunBirdCNegTC — Ignored | ||
| TC_ESignet_AuthenticateUserSunBirdCNegTC_30 | To Authenticate the user for SunBirdC with different invalid formats | 00:00:01 |
| TC_ESignet_AuthenticateUserSunBirdCNegTC_31 | To Authenticate the user for SunBirdC with different invalid formats | 00:00:01 |
| TC_ESignet_AuthenticateUserSunBirdCNegTC_32 | To Authenticate the user for SunBirdC with different invalid formats | 00:00:01 |
| TC_ESignet_AuthenticateUserSunBirdCNegTC_33 | To Authenticate the user for SunBirdC with different invalid formats | 00:00:01 |
| TC_ESignet_AuthenticateUserSunBirdCNegTC_11 | To Authenticate the user for SunBirdC with an empty authFactorType | 00:00:01 |
| TC_ESignet_AuthenticateUserSunBirdCNegTC_17 | To Authenticate the user for SunBirdC with an empty challenge | 00:00:01 |
| TC_ESignet_AuthenticateUserSunBirdCNegTC_24 | To Authenticate the user for SunBirdC with an empty challenge | 00:00:01 |
| TC_ESignet_AuthenticateUserSunBirdCNegTC_06 | To Authenticate the user for SunBirdC with an empty policy number | 00:00:01 |
| TC_ESignet_AuthenticateUserSunBirdCNegTC_03 | To Authenticate the user for SunBirdC with an empty transactionId | 00:00:01 |
| TC_ESignet_AuthenticateUserSunBirdCNegTC_04 | To Authenticate the user for SunBirdC with an expired transactionId | 00:00:00 |
| TC_ESignet_AuthenticateUserSunBirdCNegTC_10 | To Authenticate the user for SunBirdC with invalid authFactorType | 00:00:01 |
| TC_ESignet_AuthenticateUserSunBirdCNegTC_18 | To Authenticate the user for SunBirdC with an invalid challenge | 00:00:01 |
| TC_ESignet_AuthenticateUserSunBirdCNegTC_19 | To Authenticate the user for SunBirdC with invalid encoded challenge | 00:00:01 |
| TC_ESignet_AuthenticateUserSunBirdCNegTC_29 | To Authenticate the user for SunBirdC with invalid format | 00:00:01 |
| TC_ESignet_AuthenticateUserSunBirdCNegTC_05 | To Authenticate the user for SunBirdC with invalid policy number | 00:00:00 |
| TC_ESignet_AuthenticateUserSunBirdCNegTC_01 | To Authenticate the user for SunBirdC with invalid transactionId | 00:00:01 |
| TC_ESignet_AuthenticateUserSunBirdCNegTC_15 | To Authenticate the user for SunBirdC with missing authFactorType | 00:00:01 |
| TC_ESignet_AuthenticateUserSunBirdCNegTC_16 | To Authenticate the user for SunBirdC with missing challenge | 00:00:01 |
| TC_ESignet_AuthenticateUserSunBirdCNegTC_23 | To Authenticate the user for SunBirdC with an missing challenge | 00:00:01 |
| TC_ESignet_AuthenticateUserSunBirdCNegTC_09 | To Authenticate the user for SunBirdC with missing policy number | 00:00:01 |
| TC_ESignet_AuthenticateUserSunBirdCNegTC_02 | To Authenticate the user for SunBirdC with missing transactionId | 00:00:01 |
| TC_ESignet_AuthenticateUserSunBirdCNegTC_13 | To Authenticate the user for SunBirdC with null value in authFactorType | 00:00:01 |
| TC_ESignet_AuthenticateUserSunBirdCNegTC_21 | To Authenticate the user for SunBirdC with null value in challenge | 00:00:00 |
| TC_ESignet_AuthenticateUserSunBirdCNegTC_28 | To Authenticate the user for SunBirdC with null value in format | 00:00:01 |
| TC_ESignet_AuthenticateUserSunBirdCNegTC_08 | To Authenticate the user for SunBirdC with null value in policy number | 00:00:01 |
| TC_ESignet_AuthenticateUserSunBirdCNegTC_14 | To Authenticate the user for SunBirdC with other authFactorType | 00:00:01 |
| TC_ESignet_AuthenticateUserSunBirdCNegTC_22 | To Authenticate the user for SunBirdC with random challenge | 00:00:00 |
| TC_ESignet_AuthenticateUserSunBirdCNegTC_34 | To Authenticate the user for SunBirdC with invalid authcode | 00:00:00 |
| TC_ESignet_AuthenticateUserSunBirdCNegTC_35 | To Authenticate the user for SunBirdC with different invalid authcode | 00:00:01 |
| TC_ESignet_AuthenticateUserSunBirdCNegTC_36 | To Authenticate the user for SunBirdC with different invalid authcode | 00:00:01 |
| TC_ESignet_AuthenticateUserSunBirdCNegTC_37 | To Authenticate the user for SunBirdC with different invalid authcode | 00:00:01 |
| TC_ESignet_AuthenticateUserSunBirdCNegTC_38 | To Authenticate the user for SunBirdC with different invalid authcode | 00:00:01 |
| TC_ESignet_AuthenticateUserSunBirdCNegTC_39 | To Authenticate the user for SunBirdC with different invalid authcode | 00:00:01 |
| TC_ESignet_AuthenticateUserSunBirdCNegTC_40 | To Authenticate the user for SunBirdC with different invalid authcode | 00:00:00 |
| TC_ESignet_AuthenticateUserSunBirdCNegTC_41 | To Authenticate the user for SunBirdC with different invalid authcode | 00:00:01 |
| TC_ESignet_AuthenticateUserSunBirdCNegTC_12 | To Authenticate the user for SunBirdC with space value in authFactorType | 00:00:00 |
| TC_ESignet_AuthenticateUserSunBirdCNegTC_20 | To Authenticate the user for SunBirdC with space value in challenge | 00:00:01 |
| TC_ESignet_AuthenticateUserSunBirdCNegTC_25 | To Authenticate the user for SunBirdC with space value in format | 00:00:01 |
| TC_ESignet_AuthenticateUserSunBirdCNegTC_07 | To Authenticate the user for SunBirdC with space value in policy number | 00:00:01 |
| TC_ESignet_AuthenticateUserSunBirdCNegTC_27 | To Authenticate the user for SunBirdC with already used transactionId | 00:00:01 |
| TC_ESignet_AuthenticateUserSunBirdCNegTC_26 | To Authenticate the user for SunBirdC with invalid data | 00:00:01 |
| AuthorizationCodeSunBirdCNegTC — Ignored | ||
| TC_ESignet_AuthorizationCodeSunBirdCNegTC_09 | To Authenticate the user for SunBirdC with all valid data | 00:00:01 |
| TC_ESignet_AuthorizationCodeSunBirdCNegTC_03 | To Authenticate the user for SunBirdC with comma separated scope | 00:00:01 |
| TC_ESignet_AuthorizationCodeSunBirdCNegTC_02 | To Authenticate the user for SunBirdC with multiple different scope | 00:00:01 |
| TC_ESignet_AuthorizationCodeSunBirdCNegTC_01 | To Authenticate the user for SunBirdC with different scope | 00:00:01 |
| TC_ESignet_AuthorizationCodeSunBirdCNegTC_05 | To Authenticate the user for SunBirdC with an empty scope | 00:00:01 |
| TC_ESignet_AuthorizationCodeSunBirdCNegTC_07 | To Authenticate the user for SunBirdC with invalid scope | 00:00:01 |
| TC_ESignet_AuthorizationCodeSunBirdCNegTC_04 | To Authenticate the user for SunBirdC with missing scope | 00:00:01 |
| TC_ESignet_AuthorizationCodeSunBirdCNegTC_08 | To Authenticate the user for SunBirdC with null value in scope | 00:00:01 |
| TC_ESignet_AuthorizationCodeSunBirdCNegTC_06 | To Authenticate the user for SunBirdC with space value in scope | 00:00:01 |
| GenerateTokenSunBirdCNegTC — Ignored | ||
| TC_ESignet_GenerateTokenSunBirdCNegTC_03 | To Authenticate the user for SunBirdC with an empty code_verifier value | 00:00:00 |
| TC_ESignet_GenerateTokenSunBirdCNegTC_01 | To Authenticate the user for SunBirdC with invalid code_verifier | 00:00:00 |
| TC_ESignet_GenerateTokenSunBirdCNegTC_02 | To Authenticate the user for SunBirdC with missing code_verifier | 00:00:00 |
| TC_ESignet_GenerateTokenSunBirdCNegTC_05 | To Authenticate the user for SunBirdC with null value in code_verifier | 00:00:00 |
| TC_ESignet_GenerateTokenSunBirdCNegTC_04 | To Authenticate the user for SunBirdC with space value in code_verifier | 00:00:00 |
| TC_ESignet_GenerateTokenSunBirdCNegTC_06 | To Authenticate the user for SunBirdC with invalid data | 00:00:00 |
| DeletePolicySunBirdR — Ignored | ||
| TC_ESignet_DeletePolicySunBirdR_01 | To delete policy for SunBirdR with no authorization | 00:00:01 |
| CreateOIDCClientV3 — Passed | ||
| TC_ESignet_CreateOIDCClientV3_01 | To create OIDC Client V3 with all valid data | 00:00:01 |
| TC_ESignet_CreateOIDCClientV3_02 | To create OIDC Client V3 with all valid data | 00:00:01 |
| TC_ESignet_CreateOIDCClientV3_07 | To create OIDC Client V3 with arrays of values userinfoResponse | 00:00:01 |
| TC_ESignet_CreateOIDCClientV3_06 | To create OIDC Client V3 with empty string value | 00:00:01 |
| TC_ESignet_CreateOIDCClientV3_05 | To create OIDC Client V3 with empty userinfo response type | 00:00:01 |
| TC_ESignet_CreateOIDCClientV3_03 | To create OIDC Client V3 with invalid userinfo response type | 00:00:01 |
| TC_ESignet_CreateOIDCClientV3_25 | To create OIDC Client V3 with multilingual value in subtitle field | 00:00:01 |
| TC_ESignet_CreateOIDCClientV3_24 | To create OIDC Client V3 with multilingual value in title field | 00:00:01 |
| TC_ESignet_CreateOIDCClientV3_04 | To create OIDC Client V3 with unsupported userinfo response type | 00:00:01 |
| TC_ESignet_CreateOIDCClientV3_13 | To create OIDC Client V3 with purpose_type as arrayOfValues | 00:00:01 |
| TC_ESignet_CreateOIDCClientV3_11 | To create OIDC Client V3 with empty purpose_type | 00:00:01 |
| TC_ESignet_CreateOIDCClientV3_17 | To create OIDC Client V3 with empty string value in subtitle | 00:00:01 |
| TC_ESignet_CreateOIDCClientV3_12 | To create OIDC Client V3 with empty purpose_type | 00:00:01 |
| TC_ESignet_CreateOIDCClientV3_16 | To create OIDC Client V3 with empty stringValue in title | 00:00:01 |
| TC_ESignet_CreateOIDCClientV3_15 | To create OIDC Client V3 with empty subtitle | 00:00:01 |
| TC_ESignet_CreateOIDCClientV3_14 | To create OIDC Client V3 with empty title | 00:00:01 |
| TC_ESignet_CreateOIDCClientV3_20 | To create OIDC Client V3 with false forgot_pwd_link_required value | 00:00:01 |
| TC_ESignet_CreateOIDCClientV3_18 | To create OIDC Client V3 with false signup_banner_required value | 00:00:01 |
| TC_ESignet_CreateOIDCClientV3_22 | To create OIDC Client V3 with invalid consent_expire_in_mins value | 00:00:01 |
| TC_ESignet_CreateOIDCClientV3_21 | To create OIDC Client V3 with invalid forgot_pwd_link_required value | 00:00:01 |
| TC_ESignet_CreateOIDCClientV3_10 | To create OIDC Client V3 with invalid purpose_type | 00:00:01 |
| TC_ESignet_CreateOIDCClientV3_19 | To create OIDC Client V3 with invalid signup_banner_required value | 00:00:01 |
| TC_ESignet_CreateOIDCClientV3_08 | To create OIDC Client V3 with link as a purpose_type | 00:00:01 |
| TC_ESignet_CreateOIDCClientV3_09 | To create OIDC Client V3 with link as a purpose_type | 00:00:01 |
| TC_ESignet_CreateOIDCClientV3_23 | To create OIDC Client V3 without purpose_type | 00:00:01 |
| CreateOIDCClientV3PublicKeyNegSce — Passed | ||
| TC_ESignet_CreateOIDCClientV3PublicKeyNegativeScenarios_02 | Create OIDC Client V3 with Empty public key Type | 00:00:01 |
| TC_ESignet_CreateOIDCClientV3PublicKeyNegativeScenarios_01 | Create OIDC Client V3 with invalid public key Key type | 00:00:01 |
| TC_ESignet_CreateOIDCClientV3PublicKeyNegativeScenarios_03 | Create OIDC Client V3 with Malformed public key Type | 00:00:01 |
| UpdateOIDCClientV3 — Passed | ||
| TC_ESignet_UpdateOIDCClientV3_02 | To update OIDC Client V3 with invalid clientid | 00:00:01 |
| TC_ESignet_UpdateOIDCClientV3_01 | To update OIDC Client V3 with all valid data | 00:00:01 |
| TC_ESignet_UpdateOIDCClientV3_08 | To update OIDC Client V3 with arrays of values in userinfoResponse | 00:00:01 |
| TC_ESignet_UpdateOIDCClientV3_07 | To update OIDC Client V3 with empty StringValue userinfo response type | 00:00:01 |
| TC_ESignet_UpdateOIDCClientV3_06 | To update OIDC Client V3 with empty userinfo response type | 00:00:01 |
| TC_ESignet_UpdateOIDCClientV3_04 | To update OIDC Client V3 with invalid_responseType | 00:00:01 |
| TC_ESignet_UpdateOIDCClientV3_05 | To update OIDC Client V3 with unsupported_responseType | 00:00:01 |
| TC_ESignet_UpdateOIDCClientV3_28 | To update OIDC Client V3 with Subtitle LangMap | 00:00:01 |
| TC_ESignet_UpdateOIDCClientV3_27 | To update OIDC Client V3 with Title LangMap | 00:00:01 |
| TC_ESignet_UpdateOIDCClientV3_03 | To update OIDC Client V3 with valid userinfo response type | 00:00:01 |
| TC_ESignet_UpdateOIDCClientV3_21 | To update OIDC Client V3 with array of values as purpose type | 00:00:01 |
| TC_ESignet_UpdateOIDCClientV3_20 | To update OIDC Client V3 with empty string value as purpose type | 00:00:01 |
| TC_ESignet_UpdateOIDCClientV3_19 | To update OIDC Client V3 with empty purpose type | 00:00:01 |
| TC_ESignet_UpdateOIDCClientV3_14 | To update OIDC Client V3 with empty string value as subtitle | 00:00:01 |
| TC_ESignet_UpdateOIDCClientV3_13 | To update OIDC Client V3 with empty string value as title | 00:00:01 |
| TC_ESignet_UpdateOIDCClientV3_12 | To update OIDC Client V3 with empty subtitle | 00:00:01 |
| TC_ESignet_UpdateOIDCClientV3_11 | To update OIDC Client V3 with empty title | 00:00:01 |
| TC_ESignet_UpdateOIDCClientV3_24 | To update OIDC Client V3 with false as forgot_pwd_link_required field value | 00:00:01 |
| TC_ESignet_UpdateOIDCClientV3_22 | To update OIDC Client V3 with false as signup_banner_required field | 00:00:01 |
| TC_ESignet_UpdateOIDCClientV3_26 | To update OIDC Client V3 with invalid consent_expire_in_mins field value | 00:00:01 |
| TC_ESignet_UpdateOIDCClientV3_25 | To update OIDC Client V3 with invalid forgot_pwd_link_required field value | 00:00:01 |
| TC_ESignet_UpdateOIDCClientV3_18 | To update OIDC Client V3 with invalid purpose type | 00:00:01 |
| TC_ESignet_UpdateOIDCClientV3_23 | To update OIDC Client V3 with invalid signup_banner_required field value | 00:00:01 |
| TC_ESignet_UpdateOIDCClientV3_16 | To update OIDC Client V3 with link as a purpose type | 00:00:01 |
| TC_ESignet_UpdateOIDCClientV3_17 | To update OIDC Client V3 with login as a purpose type | 00:00:01 |
| TC_ESignet_UpdateOIDCClientV3_10 | To update OIDC Client V3 with valid subtitle | 00:00:01 |
| TC_ESignet_UpdateOIDCClientV3_09 | To update OIDC Client V3 with valid title | 00:00:01 |
| TC_ESignet_UpdateOIDCClientV3_15 | To update OIDC Client V3 without purpose type | 00:00:01 |
| UpdateClientV3IDA — Ignored | ||
| TC_ESignet_UpdateOIDCClientV3_03 | To update OIDC Client V3 with all valid data | 00:00:00 |
| TC_ESignet_UpdateOIDCClientV3_02 | To update OIDC Client V3 with all valid data | 00:00:00 |
| TC_ESignet_UpdateOIDCClientV3_01 | To update OIDC Client V3 with all valid data | 00:00:00 |
| OAuthDetailsRequestV3IDA — Ignored | ||
| TC_Signup_ESignet_OAuthDetailsRequestV3_Prerequisite | Get OAuth details with claims as prerequisite | 00:00:00 |
| TC_Signup_ESignet_OAuthDetailsRequestV3_Prerequisite | Get OAuth details with claims as prerequisite | 00:00:00 |
| TC_Signup_ESignet_OAuthDetailsRequestV3_Prerequisite | Get OAuth details with claims as prerequisite | 00:00:00 |
| AuthenticateUserV3IDA — Ignored | ||
| ESignet_AuthenticateUser_V3_MOSIPID_AuthToken_Xsrf__uin_Otp_Valid_ForJWSUpdatedToJWEInfo_Smoke | 00:00:00 | |
| ESignet_AuthenticateUser_V3_MOSIPID_AuthToken_Xsrf__uin_Otp_Valid_forUserInfoJWE_Smoke | 00:00:00 | |
| ESignet_AuthenticateUser_V3_MOSIPID_AuthToken_Xsrf__uin_Otp_Valid_forUserInfo_Smoke | 00:00:00 | |
| AuthorizeCodeIDA — Ignored | ||
| TC_ESignet_AuthorizationCode_03 | Authorization code request for end to end flow | 00:00:00 |
| TC_ESignet_AuthorizationCode_02 | Authorization code request for end to end flow | 00:00:00 |
| TC_ESignet_AuthorizationCode_01 | Authorization code request for end to end flow | 00:00:00 |
| GenerateTokenV2IDA — Ignored | ||
| TC_ESignet_GenerateToken_03 | Generate token with all valid details UIN for user info | 00:00:00 |
| TC_ESignet_GenerateToken_02 | Generate token with all valid details UIN for user info | 00:00:00 |
| TC_ESignet_GenerateToken_01 | Generate token with all valid details UIN for user info | 00:00:00 |
| UserInfoIDA — Ignored | ||
| TC_ESignet_GetOidcUserInfoForV3_03 | Get OIDC user info with all valid details UIN | 00:00:00 |
| TC_ESignet_GetOidcUserInfoForV3_02 | Get OIDC user info with all valid details UIN | 00:00:00 |
| TC_ESignet_GetOidcUserInfoForV3_01 | Get OIDC user info with all valid details UIN | 00:00:00 |
| OIDCClientV3MOCK — Passed | ||
| TC_ESignet_OIDCClientV3_02 | To create OIDC Client V3 with all valid data with JWE | 00:00:01 |
| TC_ESignet_OIDCClientV3_03 | To create OIDC Client V3 with all valid data with JWS | 00:00:01 |
| TC_ESignet_OIDCClientV3_01 | To create OIDC Client V3 with all valid data with JWS | 00:00:01 |
| UpdateClientV3MOCK — Passed | ||
| TC_ESignet_UpdateOIDCClientV3_01 | To update OIDC Client V3 with all valid data | 00:00:01 |
| OAuthDetailsRequestV3MOCK — Passed | ||
| TC_Signup_ESignet_OAuthDetailsRequestV3_Prerequisite | Get OAuth details with claims as prerequisite | 00:00:01 |
| TC_Signup_ESignet_OAuthDetailsRequestV3_Prerequisite | Get OAuth details with claims as prerequisite | 00:00:01 |
| TC_Signup_ESignet_OAuthDetailsRequestV3_Prerequisite | Get OAuth details with claims as prerequisite | 00:00:01 |
| AuthenticateUserV3MOCK — Passed | ||
| ESignet_AuthenticateUser_V3_MOCK_AuthToken_Xsrf__uin_Otp_Valid_forUserInfoJWE_Smoke | 00:00:01 | |
| ESignet_AuthenticateUser_V3_MOCK_AuthToken_Xsrf__uin_Otp_Valid_forUserInfoUpdatedJWE_Smoke | 00:00:01 | |
| ESignet_AuthenticateUser_V3_MOCK_AuthToken_Xsrf__uin_Otp_Valid_forUserInfo_Smoke | 00:00:01 | |
| AuthorizeCodeMOCK — Passed | ||
| TC_ESignet_AuthorizationCode_02 | Authorization code request for end to end flow JWE | 00:00:01 |
| TC_ESignet_AuthorizationCode_03 | Authorization code request for end to end flow JWE | 00:00:01 |
| TC_ESignet_AuthorizationCode_01 | Authorization code request for end to end flow | 00:00:01 |
| GenerateTokenV2MOCK — Passed | ||
| TC_ESignet_GenerateToken_02 | Generate token with all valid details UIN for user info JWE | 00:00:01 |
| TC_ESignet_GenerateToken_03 | Generate token with all valid details UIN for user info JWE | 00:00:01 |
| TC_ESignet_GenerateToken_01 | Generate token with all valid details UIN for user info | 00:00:01 |
| UserInfoMOCK — Passed | ||
| TC_ESignet_GetOidcUserInfoForV3_02 | Get OIDC user info with all valid details UIN | 00:00:01 |
| TC_ESignet_GetOidcUserInfoForV3_01 | Get OIDC user info with all valid details UIN | 00:00:01 |
| TC_ESignet_GetOidcUserInfoForV3_03 | Get OIDC user info with all valid details UIN | 00:00:01 |
| PARCreateOIDCClientV3 — Passed | ||
| TC_ESignet_PARCreateOIDCClientV3_01 | Create of OIDC Client V3 with all valid data | 00:00:01 |
| OauthPAR — Passed | ||
| TC_ESignet_OauthPar_02 | Validate successful PAR request with missing state | 00:00:01 |
| TC_ESignet_OauthPar_03 | Validate successful PAR request with missing nonce state | 00:00:01 |
| TC_ESignet_OauthPar_04 | Validate successful PAR request with valid ASCII value | 00:00:01 |
| TC_ESignet_OauthPar_01 | Validate successful PAR request with valid client details | 00:00:01 |
| TC_ESignet_OauthPar_05 | Validate successful PAR request with valid ASCII value | 00:00:01 |
| TC_ESignet_OauthPar_06 | Validate successful PAR request with valid JWT value | 00:00:01 |
| PAROauthDetails — Passed | ||
| TC_ESignet_PAROauthDetails_01 | Validate successful retrieval of OAuth details in PAR flow | 00:00:01 |
| PARAuthenticateUserV3 — Passed | ||
| TC_ESignet_PARAuthenticateUserV3_01 | Verify that the PARAuthenticateUserV3 endpoint authenticates the user successfully with valid credentials | 00:00:01 |
| PARAuthorizationCode — Passed | ||
| TC_ESignet_AuthorizationCode_01 | Validate successful authorization code generation in PAR flow | 00:00:01 |
| PARGenerateToken — Passed | ||
| TC_ESignet_PARGenerateToken_01 | Generate token with all valid details UIN for user info | 00:00:01 |
| PARGetUserInfo — Passed | ||
| TC_ESignet_PARGetUserInfo_01 | Get OIDC user info with all valid details UIN | 00:00:01 |
| OauthPARNegativeScenarios — Passed | ||
| TC_ESignet_OauthParNegativeScenarios_02 | Validate successful PAR request with invalid Scope paramenter | 00:00:01 |
| TC_ESignet_OauthParNegativeScenarios_06 | Validate successful PAR request with invalid client_id paramenter | 00:00:01 |
| TC_ESignet_OauthParNegativeScenarios_04 | Validate successful PAR request with invalid response_type paramenter | 00:00:01 |
| TC_ESignet_OauthParNegativeScenarios_01 | Validate successful PAR request with missing Scope paramenter | 00:00:01 |
| TC_ESignet_OauthParNegativeScenarios_05 | Validate successful PAR request with missing client_id paramenter | 00:00:01 |
| TC_ESignet_OauthParNegativeScenarios_07 | Validate successful PAR request with missing redirect_uri paramenter | 00:00:01 |
| TC_ESignet_OauthParNegativeScenarios_03 | Validate successful PAR request with missing Scope paramenter | 00:00:01 |
| TC_ESignet_OauthParNegativeScenarios_11 | Validate successful PAR request with unregistered redirect_uri paramenter | 00:00:01 |
| TC_ESignet_OauthParNegativeScenarios_12 | Validate successful PAR request with invalid client assertion | 00:00:01 |
| TC_ESignet_OauthParNegativeScenarios_13 | Validate successful PAR request with invalid client assertion type | 00:00:01 |
| TC_ESignet_OauthParNegativeScenarios_09 | Validate successful PAR request with unregistered redirect_uri paramenter | 00:00:01 |
| TC_ESignet_OauthParNegativeScenarios_10 | Validate successful PAR request with unregistered redirect_uri paramenter | 00:00:01 |
| TC_ESignet_OauthParNegativeScenarios_15 | Validate successful PAR request with malformed client assertion | 00:00:01 |
| TC_ESignet_OauthParNegativeScenarios_14 | Validate successful PAR request with Missing client assertion | 00:00:01 |
| TC_ESignet_OauthParNegativeScenarios_08 | Validate successful PAR request with unregistered redirect_uri paramenter | 00:00:01 |
| TC_ESignet_OauthParNegativeScenarios_16 | Validate successful PAR request without requestTime | 00:00:01 |
| PAROauthDetailsNegativeScenarios — Passed | ||
| TC_ESignet_PAROauthDetailsNegativeScenarios_02 | Validate successful retrieval of OAuth details in PAR flow with Empty clientId in request parameter | 00:00:01 |
| TC_ESignet_PAROauthDetailsNegativeScenarios_06 | Validate successful retrieval of OAuth details in PAR flow with already used RequestURI in request parameter | 00:00:01 |
| TC_ESignet_PAROauthDetailsNegativeScenarios_04 | Validate successful retrieval of OAuth details in PAR flow with invalid RequestURI in request parameter | 00:00:01 |
| TC_ESignet_PAROauthDetailsNegativeScenarios_03 | Validate successful retrieval of OAuth details in PAR flow with invalid request method | 00:00:01 |
| TC_ESignet_PAROauthDetailsNegativeScenarios_01 | Validate successful retrieval of OAuth details in PAR flow with missing clientId in request parameter | 00:00:01 |
| TC_ESignet_PAROauthDetailsNegativeScenarios_05 | Validate successful retrieval of OAuth details in PAR flow without RequestURI in request parameter | 00:00:01 |
| DPoPCreateOIDCClientV3 — Passed | ||
| TC_ESignet_PARCreateOIDCClientV3_01 | Create of OIDC Client V3 with all valid data | 00:00:01 |
| OauthDPoP — Passed | ||
| TC_ESignet_OauthDPoP_01 | Validate successful DPoP request with valid client details | 00:00:01 |
| DPoPOauthDetails — Passed | ||
| TC_ESignet_DPoPOauthDetails_01 | Validate successful retrieval of OAuth details in DPoP flow | 00:00:01 |
| DPoPAuthenticateUserV3 — Passed | ||
| TC_ESignet_DPoPAuthenticateUserV3_01 | Verify that the PARAuthenticateUserV3 endpoint authenticates the user successfully with valid credentials | 00:00:01 |
| DPoPAuthorizationCode — Passed | ||
| TC_ESignet_AuthorizationCode_01 | Validate successful authorization code generation in PAR flow | 00:00:01 |
| DPoPGenerateToken — Passed | ||
| TC_ESignet_DPoPGenerateToken_01 | Generate token with all valid details UIN for user info | 00:00:01 |
| DPoPGetUserInfo — Passed | ||
| TC_ESignet_DPoPGetUserInfo_01 | Get OIDC user info with all valid details UIN | 00:00:01 |
| OauthDPoPNegativeScenarios — Passed | ||
| TC_ESignet_OautDPoPNegativeScenarios_01 | Validate successful DPoP request with valid client details | 00:00:01 |
| TC_ESignet_OautDPoPNegativeScenarios_03 | Validate successful DPoP request with invalid client assertion | 00:00:01 |
| TC_ESignet_OautDPoPNegativeScenarios_02 | Validate successful DPoP request without dpop_jkt | 00:00:01 |
| TC_ESignet_OauthDPoPNegativeSceanrios_04 | Validate successful DPoP request with invalid client ID details | 00:00:01 |
| DPoPGenerateTokenNegativeScenarios — Passed | ||
| TC_ESignet_DPoPGenerateTokenInvalidScenarios_01 | Generate token with invalid dpop key | 00:00:01 |
| TC_ESignet_DPoPGenerateTokenInvalidScenarios_04 | Generate token without dpop value | 00:00:01 |
| DPoPOauthDetailsNegativeScenarios — Passed | ||
| TC_ESignet_DPoPOauthDetailsNegativeScenarios_01 | Validate successful retrieval of OAuth details in DPOP flow with invalid DPoP token in request | 00:00:01 |
| TC_ESignet_PAROauthDetailsNegativeScenarios_07 | Validate successful retrieval of OAuth details in DPOP flow with already used RequestURI in request parameter | 00:00:01 |
| TC_ESignet_PAROauthDetailsNegativeScenarios_03 | Validate successful retrieval of OAuth details in DPOP flow with Empty clientId in request parameter | 00:00:01 |
| TC_ESignet_PAROauthDetailsNegativeScenarios_04 | Validate successful retrieval of OAuth details in DPOP flow with invalid request method | 00:00:01 |
| TC_ESignet_DPoPOauthDetailsNegativeScenarios_02 | Validate successful retrieval of OAuth details in DPOP flow with missing clientId in request parameter | 00:00:01 |
| TC_ESignet_PAROauthDetailsNegativeScenarios_05 | Validate successful retrieval of OAuth details in DPOP flow with invalid RequestURI in request parameter | 00:00:01 |
| TC_ESignet_PAROauthDetailsNegativeScenarios_06 | Validate successful retrieval of OAuth details in DPOP flow without RequestURI in request parameter | 00:00:01 |
| OIDCClientV3VerifiedClaims — Passed | ||
| TC_ESignet_OIDCClientV3VerifiedClaims_01 | Create OIDC Client with all valid data with Verified Claims | 00:00:01 |
| OAuthDetailsRequestV3VerifiedClaims — Passed | ||
| TC_Signup_ESignet_OAuthDetailsRequestV3VerifiedClaims_01 | Get OAuth details with claims as with Verified Claims | 00:00:01 |
| AuthenticateUserV3VerifiedClaims — Passed | ||
| ESignet_AuthenticateUser_VerifiedClaims_V3_AuthToken_Xsrf__Smoke | 00:00:01 | |
| AuthorizeCodeVerifiedClaims — Passed | ||
| TC_ESignet_AuthorizationCodeVerifiedClaims_01 | Authorization code request for end to end flow | 00:00:01 |
| GenerateTokenV2VerifiedClaims — Passed | ||
| TC_ESignet_GenerateToken_01 | Generate token with all valid details UIN for user info | 00:00:01 |
| UserInfoVerifiedClaims — Passed | ||
| TC_ESignet_GetOidcUserInfoVerifiedClaims_01 | Get OIDC user info with Verified Claims | 00:00:01 |
| OIDCClientV3WithoutVerifiedClaims — Passed | ||
| TC_ESignet_OIDCClientV3WithoutVerifiedClaims_01 | Create OIDC Client with all valid data without Verified Claims | 00:00:01 |
| OAuthDetailsRequestV3WithoutVerifiedClaims — Passed | ||
| TC_Signup_ESignet_OAuthDetailsRequestV3WithoutVerifiedClaims_01 | Get OAuth details with claims as without Verified Claims | 00:00:01 |
| AuthenticateUserV3WithoutVerifiedClaims — Passed | ||
| ESignet_AuthenticateUser_Without_VerifiedClaims_V3_AuthToken_Xsrf__Smoke | 00:00:01 | |
| AuthorizeCodeWithoutVerifiedClaims — Passed | ||
| TC_ESignet_AuthorizationCodeWithoutVerifiedClaims_01 | Authorization code request for end to end flow | 00:00:01 |
| GenerateTokenV2WithoutVerifiedClaims — Passed | ||
| TC_ESignet_GenerateTokenWithoutVerifiedClaims_01 | Generate token with all valid details without Verified Claims | 00:00:01 |
| UserInfoWithoutVerifiedClaims — Passed | ||
| TC_ESignet_GetOidcUserInfoWithoutVerifiedClaims_01 | Get OIDC user info without Verified Claims | 00:00:01 |
| Testcase Name |
|---|
| ESignet_AddIdentity_BioAuth_smoke_Pos |
| Testcase Dependency |
| [] |
| Class Name |
| AddIdentity |
| Testcase Input |
| testCaseName=ESignet_AddIdentity_BioAuth_smoke_Pos, endPoint=/v1/mock-identity-system/identity, role=idrepo, templateFields=null, input={ "requesttime": "$TIMESTAMP$", "individualId": "$RANDOMINDIVIDUALIDFORMOCKIDENTITY$", "pin": "545411", "email": "$EMAILIDFORMOCKIDENTITY$", "password": "$PASSWORDFORMOCKIDENTITY$", "phone": "$PHONEFORMOCKIDENTITY$" }, output={ "status":"mock identity data created successfully" }, inputTemplate=esignet/AddIdentityMock/AddIdentity, outputTemplate=esignet/AddIdentityMock/addIdentityResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Add identity with BioAuth, uniqueIdentifier=Dependent_Idrepo_AddIdentity_14, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:210)
at io.mosip.testrig.apirig.esignet.testscripts.AddIdentity.test(AddIdentity.java:91)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_AddIdentity_Consent_Vid_smoke_Pos |
| Testcase Dependency |
| [] |
| Class Name |
| AddIdentity |
| Testcase Input |
| testCaseName=ESignet_AddIdentity_Consent_Vid_smoke_Pos, endPoint=/v1/mock-identity-system/identity, role=idrepo, templateFields=null, input={ "requesttime": "$TIMESTAMP$", "individualId": "$RANDOMINDIVIDUALIDFORMOCKIDENTITY$", "pin": "545411", "email": "$EMAILIDFORMOCKIDENTITY$", "password": "$PASSWORDFORMOCKIDENTITY$", "phone": "$PHONEFORMOCKIDENTITY$" }, output={ "status":"mock identity data created successfully" }, inputTemplate=esignet/AddIdentityMock/AddIdentity, outputTemplate=esignet/AddIdentityMock/addIdentityResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Add identity consent Vid, uniqueIdentifier=Dependent_Idrepo_AddIdentity_17, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_AddIdentity_Consent_smoke_Pos |
| Testcase Dependency |
| [] |
| Class Name |
| AddIdentity |
| Testcase Input |
| testCaseName=ESignet_AddIdentity_Consent_smoke_Pos, endPoint=/v1/mock-identity-system/identity, role=idrepo, templateFields=null, input={ "requesttime": "$TIMESTAMP$", "individualId": "$RANDOMINDIVIDUALIDFORMOCKIDENTITY$", "pin": "545411", "email": "$EMAILIDFORMOCKIDENTITY$", "password": "$PASSWORDFORMOCKIDENTITY$", "phone": "$PHONEFORMOCKIDENTITY$" }, output={ "status":"mock identity data created successfully" }, inputTemplate=esignet/AddIdentityMock/AddIdentity, outputTemplate=esignet/AddIdentityMock/addIdentityResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Add identity consent, uniqueIdentifier=Dependent_Idrepo_AddIdentity_16, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_AddIdentity_For_DPOP_smoke_Pos |
| Testcase Dependency |
| [] |
| Class Name |
| AddIdentity |
| Testcase Input |
| testCaseName=ESignet_AddIdentity_For_DPOP_smoke_Pos, endPoint=/v1/mock-identity-system/identity, role=idrepo, templateFields=null, input={ "requesttime": "$TIMESTAMP$", "individualId": "$RANDOMINDIVIDUALIDFORMOCKIDENTITY$", "pin": "545411", "email": "$EMAILIDFORMOCKIDENTITY$", "password": "$PASSWORDFORMOCKIDENTITY$", "phone": "$PHONEFORMOCKIDENTITY$" }, output={ "status":"mock identity data created successfully" }, inputTemplate=esignet/AddIdentityMock/AddIdentity, outputTemplate=esignet/AddIdentityMock/addIdentityResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Add identity with all valid parameters for DPOP Smoke test cases, uniqueIdentifier=Dependent_Idrepo_AddIdentity_44, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_AddIdentity_For_OTPFlow_VerifiedClaims_smoke_Pos |
| Testcase Dependency |
| [] |
| Class Name |
| AddIdentity |
| Testcase Input |
| testCaseName=ESignet_AddIdentity_For_OTPFlow_VerifiedClaims_smoke_Pos, endPoint=/v1/mock-identity-system/identity, role=idrepo, templateFields=null, input={ "requesttime": "$TIMESTAMP$", "individualId": "$RANDOMINDIVIDUALIDFORMOCKIDENTITY$", "pin": "545411", "email": "$EMAILIDFORMOCKIDENTITY$", "password": "$PASSWORDFORMOCKIDENTITY$", "phone": "$PHONEFORMOCKIDENTITY$" }, output={ "status":"mock identity data created successfully" }, inputTemplate=esignet/AddIdentityMock/AddIdentity, outputTemplate=esignet/AddIdentityMock/addIdentityResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Add identity with all valid parameters for PAR Smoke test cases, uniqueIdentifier=Dependent_Idrepo_AddIdentity_45, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_AddIdentity_For_OTPFlow_WithoutVerifiedClaims_smoke_Pos |
| Testcase Dependency |
| [] |
| Class Name |
| AddIdentity |
| Testcase Input |
| testCaseName=ESignet_AddIdentity_For_OTPFlow_WithoutVerifiedClaims_smoke_Pos, endPoint=/v1/mock-identity-system/identity, role=idrepo, templateFields=null, input={ "requesttime": "$TIMESTAMP$", "individualId": "$RANDOMINDIVIDUALIDFORMOCKIDENTITY$", "pin": "545411", "email": "$EMAILIDFORMOCKIDENTITY$", "password": "$PASSWORDFORMOCKIDENTITY$", "phone": "$PHONEFORMOCKIDENTITY$" }, output={ "status":"mock identity data created successfully" }, inputTemplate=esignet/AddIdentityMock/AddIdentity, outputTemplate=esignet/AddIdentityMock/addIdentityResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Add identity with all valid parameters for DPOP Smoke test cases, uniqueIdentifier=Dependent_Idrepo_AddIdentity_46, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_AddIdentity_For_PAR_smoke_Pos |
| Testcase Dependency |
| [] |
| Class Name |
| AddIdentity |
| Testcase Input |
| testCaseName=ESignet_AddIdentity_For_PAR_smoke_Pos, endPoint=/v1/mock-identity-system/identity, role=idrepo, templateFields=null, input={ "requesttime": "$TIMESTAMP$", "individualId": "$RANDOMINDIVIDUALIDFORMOCKIDENTITY$", "pin": "545411", "email": "$EMAILIDFORMOCKIDENTITY$", "password": "$PASSWORDFORMOCKIDENTITY$", "phone": "$PHONEFORMOCKIDENTITY$" }, output={ "status":"mock identity data created successfully" }, inputTemplate=esignet/AddIdentityMock/AddIdentity, outputTemplate=esignet/AddIdentityMock/addIdentityResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Add identity with all valid parameters for PAR Smoke test cases, uniqueIdentifier=Dependent_Idrepo_AddIdentity_43, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_AddIdentity_Invalid_Scen_smoke_Pos |
| Testcase Dependency |
| [] |
| Class Name |
| AddIdentity |
| Testcase Input |
| testCaseName=ESignet_AddIdentity_Invalid_Scen_smoke_Pos, endPoint=/v1/mock-identity-system/identity, role=idrepo, templateFields=null, input={ "requesttime": "$TIMESTAMP$", "individualId": "$RANDOMINDIVIDUALIDFORMOCKIDENTITY$", "pin": "545411", "email": "$EMAILIDFORMOCKIDENTITY$", "password": "$PASSWORDFORMOCKIDENTITY$", "phone": "$PHONEFORMOCKIDENTITY$" }, output={ "status":"mock identity data created successfully" }, inputTemplate=esignet/AddIdentityMock/AddIdentity, outputTemplate=esignet/AddIdentityMock/addIdentityResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Add identity with invalid scenario, uniqueIdentifier=Dependent_Idrepo_AddIdentity_03, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_AddIdentity_KycAuth_smoke_Pos |
| Testcase Dependency |
| [] |
| Class Name |
| AddIdentity |
| Testcase Input |
| testCaseName=ESignet_AddIdentity_KycAuth_smoke_Pos, endPoint=/v1/mock-identity-system/identity, role=idrepo, templateFields=null, input={ "requesttime": "$TIMESTAMP$", "individualId": "$RANDOMINDIVIDUALIDFORMOCKIDENTITY$", "pin": "545411", "email": "$EMAILIDFORMOCKIDENTITY$", "password": "$PASSWORDFORMOCKIDENTITY$", "phone": "$PHONEFORMOCKIDENTITY$" }, output={ "status":"mock identity data created successfully" }, inputTemplate=esignet/AddIdentityMock/AddIdentity, outputTemplate=esignet/AddIdentityMock/addIdentityResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Add identity with KycAuth, uniqueIdentifier=Dependent_Idrepo_AddIdentity_15, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_AddIdentity_L2_Valid_Parameters_ForOnlyEssentialclaims_Pos |
| Testcase Dependency |
| [] |
| Class Name |
| AddIdentity |
| Testcase Input |
| testCaseName=ESignet_AddIdentity_L2_Valid_Parameters_ForOnlyEssentialclaims_Pos, endPoint=/v1/mock-identity-system/identity, role=idrepo, templateFields=null, input={ "requesttime": "$TIMESTAMP$", "individualId": "$RANDOMINDIVIDUALIDFORMOCKIDENTITY$", "pin": "545411", "email": "$EMAILIDFORMOCKIDENTITY$", "password": "$PASSWORDFORMOCKIDENTITY$", "phone": "$PHONEFORMOCKIDENTITY$" }, output={ "status":"mock identity data created successfully" }, inputTemplate=esignet/AddIdentityMock/AddIdentity, outputTemplate=esignet/AddIdentityMock/addIdentityResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Add identity for linked consent, uniqueIdentifier=Dependent_Idrepo_AddIdentity_39, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_AddIdentity_L2_Valid_Parameters_ForPartialEseentialAndOptionalClaim_Pos |
| Testcase Dependency |
| [] |
| Class Name |
| AddIdentity |
| Testcase Input |
| testCaseName=ESignet_AddIdentity_L2_Valid_Parameters_ForPartialEseentialAndOptionalClaim_Pos, endPoint=/v1/mock-identity-system/identity, role=idrepo, templateFields=null, input={ "requesttime": "$TIMESTAMP$", "individualId": "$RANDOMINDIVIDUALIDFORMOCKIDENTITY$", "pin": "545411", "email": "$EMAILIDFORMOCKIDENTITY$", "password": "$PASSWORDFORMOCKIDENTITY$", "phone": "$PHONEFORMOCKIDENTITY$" }, output={ "status":"mock identity data created successfully" }, inputTemplate=esignet/AddIdentityMock/AddIdentity, outputTemplate=esignet/AddIdentityMock/addIdentityResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Add identity for linked consent, uniqueIdentifier=Dependent_Idrepo_AddIdentity_38, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_AddIdentity_L2_Valid_Parameters_OnlyOptionalClaim_IfEssAndOptAsRequestedClaim_Pos |
| Testcase Dependency |
| [] |
| Class Name |
| AddIdentity |
| Testcase Input |
| testCaseName=ESignet_AddIdentity_L2_Valid_Parameters_OnlyOptionalClaim_IfEssAndOptAsRequestedClaim_Pos, endPoint=/v1/mock-identity-system/identity, role=idrepo, templateFields=null, input={ "requesttime": "$TIMESTAMP$", "individualId": "$RANDOMINDIVIDUALIDFORMOCKIDENTITY$", "pin": "545411", "email": "$EMAILIDFORMOCKIDENTITY$", "password": "$PASSWORDFORMOCKIDENTITY$", "phone": "$PHONEFORMOCKIDENTITY$" }, output={ "status":"mock identity data created successfully" }, inputTemplate=esignet/AddIdentityMock/AddIdentity, outputTemplate=esignet/AddIdentityMock/addIdentityResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Add identity for linked consent, uniqueIdentifier=Dependent_Idrepo_AddIdentity_37, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_AddIdentity_L2_Valid_Parameters_consent_authcode_Pos |
| Testcase Dependency |
| [] |
| Class Name |
| AddIdentity |
| Testcase Input |
| testCaseName=ESignet_AddIdentity_L2_Valid_Parameters_consent_authcode_Pos, endPoint=/v1/mock-identity-system/identity, role=idrepo, templateFields=null, input={ "requesttime": "$TIMESTAMP$", "individualId": "$RANDOMINDIVIDUALIDFORMOCKIDENTITY$", "pin": "545411", "email": "$EMAILIDFORMOCKIDENTITY$", "password": "$PASSWORDFORMOCKIDENTITY$", "phone": "$PHONEFORMOCKIDENTITY$" }, output={ "status":"mock identity data created successfully" }, inputTemplate=esignet/AddIdentityMock/AddIdentity, outputTemplate=esignet/AddIdentityMock/addIdentityResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Add identity for v3 end to end flow, uniqueIdentifier=Dependent_Idrepo_AddIdentity_28, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_AddIdentity_L2_Valid_Parameters_forEmptyAcceptedClaimIfRequestedIsOptional_Pos |
| Testcase Dependency |
| [] |
| Class Name |
| AddIdentity |
| Testcase Input |
| testCaseName=ESignet_AddIdentity_L2_Valid_Parameters_forEmptyAcceptedClaimIfRequestedIsOptional_Pos, endPoint=/v1/mock-identity-system/identity, role=idrepo, templateFields=null, input={ "requesttime": "$TIMESTAMP$", "individualId": "$RANDOMINDIVIDUALIDFORMOCKIDENTITY$", "pin": "545411", "email": "$EMAILIDFORMOCKIDENTITY$", "password": "$PASSWORDFORMOCKIDENTITY$", "phone": "$PHONEFORMOCKIDENTITY$" }, output={ "status":"mock identity data created successfully" }, inputTemplate=esignet/AddIdentityMock/AddIdentity, outputTemplate=esignet/AddIdentityMock/addIdentityResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Add identity for linked consent, uniqueIdentifier=Dependent_Idrepo_AddIdentity_42, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_AddIdentity_L2_Valid_Parameters_forEmptyAsAcceptedClaim_Pos |
| Testcase Dependency |
| [] |
| Class Name |
| AddIdentity |
| Testcase Input |
| testCaseName=ESignet_AddIdentity_L2_Valid_Parameters_forEmptyAsAcceptedClaim_Pos, endPoint=/v1/mock-identity-system/identity, role=idrepo, templateFields=null, input={ "requesttime": "$TIMESTAMP$", "individualId": "$RANDOMINDIVIDUALIDFORMOCKIDENTITY$", "pin": "545411", "email": "$EMAILIDFORMOCKIDENTITY$", "password": "$PASSWORDFORMOCKIDENTITY$", "phone": "$PHONEFORMOCKIDENTITY$" }, output={ "status":"mock identity data created successfully" }, inputTemplate=esignet/AddIdentityMock/AddIdentity, outputTemplate=esignet/AddIdentityMock/addIdentityResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Add identity for linked consent, uniqueIdentifier=Dependent_Idrepo_AddIdentity_40, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_AddIdentity_L2_Valid_Parameters_forInvalidAcceptedClaims_Pos |
| Testcase Dependency |
| [] |
| Class Name |
| AddIdentity |
| Testcase Input |
| testCaseName=ESignet_AddIdentity_L2_Valid_Parameters_forInvalidAcceptedClaims_Pos, endPoint=/v1/mock-identity-system/identity, role=idrepo, templateFields=null, input={ "requesttime": "$TIMESTAMP$", "individualId": "$RANDOMINDIVIDUALIDFORMOCKIDENTITY$", "pin": "545411", "email": "$EMAILIDFORMOCKIDENTITY$", "password": "$PASSWORDFORMOCKIDENTITY$", "phone": "$PHONEFORMOCKIDENTITY$" }, output={ "status":"mock identity data created successfully" }, inputTemplate=esignet/AddIdentityMock/AddIdentity, outputTemplate=esignet/AddIdentityMock/addIdentityResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Add identity for linked consent, uniqueIdentifier=Dependent_Idrepo_AddIdentity_36, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_AddIdentity_L2_Valid_Parameters_forOnlyOptionalClaimIfRequestedOptional_Pos |
| Testcase Dependency |
| [] |
| Class Name |
| AddIdentity |
| Testcase Input |
| testCaseName=ESignet_AddIdentity_L2_Valid_Parameters_forOnlyOptionalClaimIfRequestedOptional_Pos, endPoint=/v1/mock-identity-system/identity, role=idrepo, templateFields=null, input={ "requesttime": "$TIMESTAMP$", "individualId": "$RANDOMINDIVIDUALIDFORMOCKIDENTITY$", "pin": "545411", "email": "$EMAILIDFORMOCKIDENTITY$", "password": "$PASSWORDFORMOCKIDENTITY$", "phone": "$PHONEFORMOCKIDENTITY$" }, output={ "status":"mock identity data created successfully" }, inputTemplate=esignet/AddIdentityMock/AddIdentity, outputTemplate=esignet/AddIdentityMock/addIdentityResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Add identity for linked consent, uniqueIdentifier=Dependent_Idrepo_AddIdentity_41, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_AddIdentity_L2_Valid_Parameters_forUserInfoJWE_smoke_Pos |
| Testcase Dependency |
| [] |
| Class Name |
| AddIdentity |
| Testcase Input |
| testCaseName=ESignet_AddIdentity_L2_Valid_Parameters_forUserInfoJWE_smoke_Pos, endPoint=/v1/mock-identity-system/identity, role=idrepo, templateFields=null, input={ "requesttime": "$TIMESTAMP$", "individualId": "$RANDOMINDIVIDUALIDFORMOCKIDENTITY$", "pin": "545411", "email": "$EMAILIDFORMOCKIDENTITY$", "password": "$PASSWORDFORMOCKIDENTITY$", "phone": "$PHONEFORMOCKIDENTITY$" }, output={ "status":"mock identity data created successfully" }, inputTemplate=esignet/AddIdentityMock/AddIdentity, outputTemplate=esignet/AddIdentityMock/addIdentityResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Add identity for v3 end to end flow, uniqueIdentifier=Dependent_Idrepo_AddIdentity_26, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_AddIdentity_L2_Valid_Parameters_forUserInfoUpdatedJWE_smoke_Pos |
| Testcase Dependency |
| [] |
| Class Name |
| AddIdentity |
| Testcase Input |
| testCaseName=ESignet_AddIdentity_L2_Valid_Parameters_forUserInfoUpdatedJWE_smoke_Pos, endPoint=/v1/mock-identity-system/identity, role=idrepo, templateFields=null, input={ "requesttime": "$TIMESTAMP$", "individualId": "$RANDOMINDIVIDUALIDFORMOCKIDENTITY$", "pin": "545411", "email": "$EMAILIDFORMOCKIDENTITY$", "password": "$PASSWORDFORMOCKIDENTITY$", "phone": "$PHONEFORMOCKIDENTITY$" }, output={ "status":"mock identity data created successfully" }, inputTemplate=esignet/AddIdentityMock/AddIdentity, outputTemplate=esignet/AddIdentityMock/addIdentityResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Add identity for v3 end to end flow, uniqueIdentifier=Dependent_Idrepo_AddIdentity_27, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_AddIdentity_L2_Valid_Parameters_forUserInfo_smoke_Pos |
| Testcase Dependency |
| [] |
| Class Name |
| AddIdentity |
| Testcase Input |
| testCaseName=ESignet_AddIdentity_L2_Valid_Parameters_forUserInfo_smoke_Pos, endPoint=/v1/mock-identity-system/identity, role=idrepo, templateFields=null, input={ "requesttime": "$TIMESTAMP$", "individualId": "$RANDOMINDIVIDUALIDFORMOCKIDENTITY$", "pin": "545411", "email": "$EMAILIDFORMOCKIDENTITY$", "password": "$PASSWORDFORMOCKIDENTITY$", "phone": "$PHONEFORMOCKIDENTITY$" }, output={ "status":"mock identity data created successfully" }, inputTemplate=esignet/AddIdentityMock/AddIdentity, outputTemplate=esignet/AddIdentityMock/addIdentityResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Add identity for v3 end to end flow, uniqueIdentifier=Dependent_Idrepo_AddIdentity_25, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_AddIdentity_L2_Valid_Parameters_linkedconsent_forAcceptedClaims_Pos |
| Testcase Dependency |
| [] |
| Class Name |
| AddIdentity |
| Testcase Input |
| testCaseName=ESignet_AddIdentity_L2_Valid_Parameters_linkedconsent_forAcceptedClaims_Pos, endPoint=/v1/mock-identity-system/identity, role=idrepo, templateFields=null, input={ "requesttime": "$TIMESTAMP$", "individualId": "$RANDOMINDIVIDUALIDFORMOCKIDENTITY$", "pin": "545411", "email": "$EMAILIDFORMOCKIDENTITY$", "password": "$PASSWORDFORMOCKIDENTITY$", "phone": "$PHONEFORMOCKIDENTITY$" }, output={ "status":"mock identity data created successfully" }, inputTemplate=esignet/AddIdentityMock/AddIdentity, outputTemplate=esignet/AddIdentityMock/addIdentityResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Add identity for linked consent, uniqueIdentifier=Dependent_Idrepo_AddIdentity_29, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_AddIdentity_L2_Valid_Parameters_linkedconsent_forOptionalClaims_Pos |
| Testcase Dependency |
| [] |
| Class Name |
| AddIdentity |
| Testcase Input |
| testCaseName=ESignet_AddIdentity_L2_Valid_Parameters_linkedconsent_forOptionalClaims_Pos, endPoint=/v1/mock-identity-system/identity, role=idrepo, templateFields=null, input={ "requesttime": "$TIMESTAMP$", "individualId": "$RANDOMINDIVIDUALIDFORMOCKIDENTITY$", "pin": "545411", "email": "$EMAILIDFORMOCKIDENTITY$", "password": "$PASSWORDFORMOCKIDENTITY$", "phone": "$PHONEFORMOCKIDENTITY$" }, output={ "status":"mock identity data created successfully" }, inputTemplate=esignet/AddIdentityMock/AddIdentity, outputTemplate=esignet/AddIdentityMock/addIdentityResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Add identity for linked consent, uniqueIdentifier=Dependent_Idrepo_AddIdentity_30, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_AddIdentity_L2_Valid_Parameters_linkedconsent_forPartialEssentialOptionalClaims_Pos |
| Testcase Dependency |
| [] |
| Class Name |
| AddIdentity |
| Testcase Input |
| testCaseName=ESignet_AddIdentity_L2_Valid_Parameters_linkedconsent_forPartialEssentialOptionalClaims_Pos, endPoint=/v1/mock-identity-system/identity, role=idrepo, templateFields=null, input={ "requesttime": "$TIMESTAMP$", "individualId": "$RANDOMINDIVIDUALIDFORMOCKIDENTITY$", "pin": "545411", "email": "$EMAILIDFORMOCKIDENTITY$", "password": "$PASSWORDFORMOCKIDENTITY$", "phone": "$PHONEFORMOCKIDENTITY$" }, output={ "status":"mock identity data created successfully" }, inputTemplate=esignet/AddIdentityMock/AddIdentity, outputTemplate=esignet/AddIdentityMock/addIdentityResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Add identity for linked consent, uniqueIdentifier=Dependent_Idrepo_AddIdentity_31, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_AddIdentity_L2_Valid_Parameters_linkedconsent_for_OnlyOptionalClaimAsRequested_AcceptedClaim_Pos |
| Testcase Dependency |
| [] |
| Class Name |
| AddIdentity |
| Testcase Input |
| testCaseName=ESignet_AddIdentity_L2_Valid_Parameters_linkedconsent_for_OnlyOptionalClaimAsRequested_AcceptedClaim_Pos, endPoint=/v1/mock-identity-system/identity, role=idrepo, templateFields=null, input={ "requesttime": "$TIMESTAMP$", "individualId": "$RANDOMINDIVIDUALIDFORMOCKIDENTITY$", "pin": "545411", "email": "$EMAILIDFORMOCKIDENTITY$", "password": "$PASSWORDFORMOCKIDENTITY$", "phone": "$PHONEFORMOCKIDENTITY$" }, output={ "status":"mock identity data created successfully" }, inputTemplate=esignet/AddIdentityMock/AddIdentity, outputTemplate=esignet/AddIdentityMock/addIdentityResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Add identity for linked consent, uniqueIdentifier=Dependent_Idrepo_AddIdentity_34, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_AddIdentity_L2_Valid_Parameters_linkedconsent_for_null_asEssentialClaims_AcceptedClaim_Pos |
| Testcase Dependency |
| [] |
| Class Name |
| AddIdentity |
| Testcase Input |
| testCaseName=ESignet_AddIdentity_L2_Valid_Parameters_linkedconsent_for_null_asEssentialClaims_AcceptedClaim_Pos, endPoint=/v1/mock-identity-system/identity, role=idrepo, templateFields=null, input={ "requesttime": "$TIMESTAMP$", "individualId": "$RANDOMINDIVIDUALIDFORMOCKIDENTITY$", "pin": "545411", "email": "$EMAILIDFORMOCKIDENTITY$", "password": "$PASSWORDFORMOCKIDENTITY$", "phone": "$PHONEFORMOCKIDENTITY$" }, output={ "status":"mock identity data created successfully" }, inputTemplate=esignet/AddIdentityMock/AddIdentity, outputTemplate=esignet/AddIdentityMock/addIdentityResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Add identity for linked consent, uniqueIdentifier=Dependent_Idrepo_AddIdentity_33, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_AddIdentity_L2_Valid_Parameters_linkedconsent_for_without_AcceptedClaim_IfOnlyOptionalRequested_Pos |
| Testcase Dependency |
| [] |
| Class Name |
| AddIdentity |
| Testcase Input |
| testCaseName=ESignet_AddIdentity_L2_Valid_Parameters_linkedconsent_for_without_AcceptedClaim_IfOnlyOptionalRequested_Pos, endPoint=/v1/mock-identity-system/identity, role=idrepo, templateFields=null, input={ "requesttime": "$TIMESTAMP$", "individualId": "$RANDOMINDIVIDUALIDFORMOCKIDENTITY$", "pin": "545411", "email": "$EMAILIDFORMOCKIDENTITY$", "password": "$PASSWORDFORMOCKIDENTITY$", "phone": "$PHONEFORMOCKIDENTITY$" }, output={ "status":"mock identity data created successfully" }, inputTemplate=esignet/AddIdentityMock/AddIdentity, outputTemplate=esignet/AddIdentityMock/addIdentityResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Add identity for linked consent, uniqueIdentifier=Dependent_Idrepo_AddIdentity_35, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_AddIdentity_L2_Valid_Parameters_linkedconsent_foronlyEssentialClaims_Pos |
| Testcase Dependency |
| [] |
| Class Name |
| AddIdentity |
| Testcase Input |
| testCaseName=ESignet_AddIdentity_L2_Valid_Parameters_linkedconsent_foronlyEssentialClaims_Pos, endPoint=/v1/mock-identity-system/identity, role=idrepo, templateFields=null, input={ "requesttime": "$TIMESTAMP$", "individualId": "$RANDOMINDIVIDUALIDFORMOCKIDENTITY$", "pin": "545411", "email": "$EMAILIDFORMOCKIDENTITY$", "password": "$PASSWORDFORMOCKIDENTITY$", "phone": "$PHONEFORMOCKIDENTITY$" }, output={ "status":"mock identity data created successfully" }, inputTemplate=esignet/AddIdentityMock/AddIdentity, outputTemplate=esignet/AddIdentityMock/addIdentityResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Add identity for linked consent, uniqueIdentifier=Dependent_Idrepo_AddIdentity_32, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_AddIdentity_L2_Valid_Parameters_smoke_Neg_Pos |
| Testcase Dependency |
| [] |
| Class Name |
| AddIdentity |
| Testcase Input |
| testCaseName=ESignet_AddIdentity_L2_Valid_Parameters_smoke_Neg_Pos, endPoint=/v1/mock-identity-system/identity, role=idrepo, templateFields=null, input={ "requesttime": "$TIMESTAMP$", "individualId": "$RANDOMINDIVIDUALIDFORMOCKIDENTITY$", "pin": "545411", "email": "$EMAILIDFORMOCKIDENTITY$", "password": "$PASSWORDFORMOCKIDENTITY$", "phone": "$PHONEFORMOCKIDENTITY$" }, output={ "status":"mock identity data created successfully" }, inputTemplate=esignet/AddIdentityMock/AddIdentity, outputTemplate=esignet/AddIdentityMock/addIdentityResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Add identity with password authentication, uniqueIdentifier=Dependent_Idrepo_AddIdentity_24, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_AddIdentity_L2_Valid_Parameters_smoke_Pos |
| Testcase Dependency |
| [] |
| Class Name |
| AddIdentity |
| Testcase Input |
| testCaseName=ESignet_AddIdentity_L2_Valid_Parameters_smoke_Pos, endPoint=/v1/mock-identity-system/identity, role=idrepo, templateFields=null, input={ "requesttime": "$TIMESTAMP$", "individualId": "$RANDOMINDIVIDUALIDFORMOCKIDENTITY$", "pin": "545411", "email": "$EMAILIDFORMOCKIDENTITY$", "password": "$PASSWORDFORMOCKIDENTITY$", "phone": "$PHONEFORMOCKIDENTITY$" }, output={ "status":"mock identity data created successfully" }, inputTemplate=esignet/AddIdentityMock/AddIdentity, outputTemplate=esignet/AddIdentityMock/addIdentityResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Add identity with password authentication, uniqueIdentifier=Dependent_Idrepo_AddIdentity_23, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_AddIdentity_Linked_Consent_User2_Vid_smoke_Pos |
| Testcase Dependency |
| [] |
| Class Name |
| AddIdentity |
| Testcase Input |
| testCaseName=ESignet_AddIdentity_Linked_Consent_User2_Vid_smoke_Pos, endPoint=/v1/mock-identity-system/identity, role=idrepo, templateFields=null, input={ "requesttime": "$TIMESTAMP$", "individualId": "$RANDOMINDIVIDUALIDFORMOCKIDENTITY$", "pin": "545411", "email": "$EMAILIDFORMOCKIDENTITY$", "password": "$PASSWORDFORMOCKIDENTITY$", "phone": "$PHONEFORMOCKIDENTITY$" }, output={ "status":"mock identity data created successfully" }, inputTemplate=esignet/AddIdentityMock/AddIdentity, outputTemplate=esignet/AddIdentityMock/addIdentityResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Add identity linked consent user2 Vid, uniqueIdentifier=Dependent_Idrepo_AddIdentity_13, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_AddIdentity_Linked_Consent_User2_smoke_Pos |
| Testcase Dependency |
| [] |
| Class Name |
| AddIdentity |
| Testcase Input |
| testCaseName=ESignet_AddIdentity_Linked_Consent_User2_smoke_Pos, endPoint=/v1/mock-identity-system/identity, role=idrepo, templateFields=null, input={ "requesttime": "$TIMESTAMP$", "individualId": "$RANDOMINDIVIDUALIDFORMOCKIDENTITY$", "pin": "545411", "email": "$EMAILIDFORMOCKIDENTITY$", "password": "$PASSWORDFORMOCKIDENTITY$", "phone": "$PHONEFORMOCKIDENTITY$" }, output={ "status":"mock identity data created successfully" }, inputTemplate=esignet/AddIdentityMock/AddIdentity, outputTemplate=esignet/AddIdentityMock/addIdentityResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Add identity linked consent user2, uniqueIdentifier=Dependent_Idrepo_AddIdentity_11, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_AddIdentity_Linked_Consent_Vid_smoke_Pos |
| Testcase Dependency |
| [] |
| Class Name |
| AddIdentity |
| Testcase Input |
| testCaseName=ESignet_AddIdentity_Linked_Consent_Vid_smoke_Pos, endPoint=/v1/mock-identity-system/identity, role=idrepo, templateFields=null, input={ "requesttime": "$TIMESTAMP$", "individualId": "$RANDOMINDIVIDUALIDFORMOCKIDENTITY$", "pin": "545411", "email": "$EMAILIDFORMOCKIDENTITY$", "password": "$PASSWORDFORMOCKIDENTITY$", "phone": "$PHONEFORMOCKIDENTITY$" }, output={ "status":"mock identity data created successfully" }, inputTemplate=esignet/AddIdentityMock/AddIdentity, outputTemplate=esignet/AddIdentityMock/addIdentityResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Add identity linked consent Vid, uniqueIdentifier=Dependent_Idrepo_AddIdentity_12, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_AddIdentity_Linked_Consent_smoke_Pos |
| Testcase Dependency |
| [] |
| Class Name |
| AddIdentity |
| Testcase Input |
| testCaseName=ESignet_AddIdentity_Linked_Consent_smoke_Pos, endPoint=/v1/mock-identity-system/identity, role=idrepo, templateFields=null, input={ "requesttime": "$TIMESTAMP$", "individualId": "$RANDOMINDIVIDUALIDFORMOCKIDENTITY$", "pin": "545411", "email": "$EMAILIDFORMOCKIDENTITY$", "password": "$PASSWORDFORMOCKIDENTITY$", "phone": "$PHONEFORMOCKIDENTITY$" }, output={ "status":"mock identity data created successfully" }, inputTemplate=esignet/AddIdentityMock/AddIdentity, outputTemplate=esignet/AddIdentityMock/addIdentityResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Add identity linked consent, uniqueIdentifier=Dependent_Idrepo_AddIdentity_10, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_AddIdentity_Linked_Sce_smoke_Pos |
| Testcase Dependency |
| [] |
| Class Name |
| AddIdentity |
| Testcase Input |
| testCaseName=ESignet_AddIdentity_Linked_Sce_smoke_Pos, endPoint=/v1/mock-identity-system/identity, role=idrepo, templateFields=null, input={ "requesttime": "$TIMESTAMP$", "individualId": "$RANDOMINDIVIDUALIDFORMOCKIDENTITY$", "pin": "545411", "email": "$EMAILIDFORMOCKIDENTITY$", "password": "$PASSWORDFORMOCKIDENTITY$", "phone": "$PHONEFORMOCKIDENTITY$" }, output={ "status":"mock identity data created successfully" }, inputTemplate=esignet/AddIdentityMock/AddIdentity, outputTemplate=esignet/AddIdentityMock/addIdentityResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Add identity with valid parameters, uniqueIdentifier=Dependent_Idrepo_AddIdentity_09, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_AddIdentity_Password_Auth_smoke_Pos |
| Testcase Dependency |
| [] |
| Class Name |
| AddIdentity |
| Testcase Input |
| testCaseName=ESignet_AddIdentity_Password_Auth_smoke_Pos, endPoint=/v1/mock-identity-system/identity, role=idrepo, templateFields=null, input={ "requesttime": "$TIMESTAMP$", "individualId": "$RANDOMINDIVIDUALIDFORMOCKIDENTITY$", "pin": "545411", "email": "$EMAILIDFORMOCKIDENTITY$", "password": "$PASSWORDFORMOCKIDENTITY$", "phone": "$PHONEFORMOCKIDENTITY$" }, output={ "status":"mock identity data created successfully" }, inputTemplate=esignet/AddIdentityMock/AddIdentity, outputTemplate=esignet/AddIdentityMock/addIdentityResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Add identity with password authentication, uniqueIdentifier=Dependent_Idrepo_AddIdentity_22, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_AddIdentity_Valid_Parameters_Sce2_smoke_Pos |
| Testcase Dependency |
| [] |
| Class Name |
| AddIdentity |
| Testcase Input |
| testCaseName=ESignet_AddIdentity_Valid_Parameters_Sce2_smoke_Pos, endPoint=/v1/mock-identity-system/identity, role=idrepo, templateFields=null, input={ "requesttime": "$TIMESTAMP$", "individualId": "$RANDOMINDIVIDUALIDFORMOCKIDENTITY$", "pin": "545411", "email": "$EMAILIDFORMOCKIDENTITY$", "password": "$PASSWORDFORMOCKIDENTITY$", "phone": "$PHONEFORMOCKIDENTITY$" }, output={ "status":"mock identity data created successfully" }, inputTemplate=esignet/AddIdentityMock/AddIdentity, outputTemplate=esignet/AddIdentityMock/addIdentityResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Add identity with all valid parameters, uniqueIdentifier=Dependent_Idrepo_AddIdentity_02, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_AddIdentity_Valid_Parameters_smoke_Pos |
| Testcase Dependency |
| [] |
| Class Name |
| AddIdentity |
| Testcase Input |
| testCaseName=ESignet_AddIdentity_Valid_Parameters_smoke_Pos, endPoint=/v1/mock-identity-system/identity, role=idrepo, templateFields=null, input={ "requesttime": "$TIMESTAMP$", "individualId": "$RANDOMINDIVIDUALIDFORMOCKIDENTITY$", "pin": "545411", "email": "$EMAILIDFORMOCKIDENTITY$", "password": "$PASSWORDFORMOCKIDENTITY$", "phone": "$PHONEFORMOCKIDENTITY$" }, output={ "status":"mock identity data created successfully" }, inputTemplate=esignet/AddIdentityMock/AddIdentity, outputTemplate=esignet/AddIdentityMock/addIdentityResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Add identity with all valid parameters, uniqueIdentifier=Dependent_Idrepo_AddIdentity_01, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_AddIdentity_Valid_Params_BindOtp_smoke_Pos |
| Testcase Dependency |
| [] |
| Class Name |
| AddIdentity |
| Testcase Input |
| testCaseName=ESignet_AddIdentity_Valid_Params_BindOtp_smoke_Pos, endPoint=/v1/mock-identity-system/identity, role=idrepo, templateFields=null, input={ "requesttime": "$TIMESTAMP$", "individualId": "$RANDOMINDIVIDUALIDFORMOCKIDENTITY$", "pin": "545411", "email": "$EMAILIDFORMOCKIDENTITY$", "password": "$PASSWORDFORMOCKIDENTITY$", "phone": "$PHONEFORMOCKIDENTITY$" }, output={ "status":"mock identity data created successfully" }, inputTemplate=esignet/AddIdentityMock/AddIdentity, outputTemplate=esignet/AddIdentityMock/addIdentityResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Add identity with all valid parameters, uniqueIdentifier=Dependent_Idrepo_AddIdentity_04, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_AddIdentity_Valid_Params_VCI_Vid_Inv_Scen_smoke_Pos |
| Testcase Dependency |
| [] |
| Class Name |
| AddIdentity |
| Testcase Input |
| testCaseName=ESignet_AddIdentity_Valid_Params_VCI_Vid_Inv_Scen_smoke_Pos, endPoint=/v1/mock-identity-system/identity, role=idrepo, templateFields=null, input={ "requesttime": "$TIMESTAMP$", "individualId": "$RANDOMINDIVIDUALIDFORMOCKIDENTITY$", "pin": "545411", "email": "$EMAILIDFORMOCKIDENTITY$", "password": "$PASSWORDFORMOCKIDENTITY$", "phone": "$PHONEFORMOCKIDENTITY$" }, output={ "status":"mock identity data created successfully" }, inputTemplate=esignet/AddIdentityMock/AddIdentity, outputTemplate=esignet/AddIdentityMock/addIdentityResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Add identity with valid parameters VCI Vid invalid scenario, uniqueIdentifier=Dependent_Idrepo_AddIdentity_21, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_AddIdentity_Valid_Params_VCI_Vid_smoke_Pos |
| Testcase Dependency |
| [] |
| Class Name |
| AddIdentity |
| Testcase Input |
| testCaseName=ESignet_AddIdentity_Valid_Params_VCI_Vid_smoke_Pos, endPoint=/v1/mock-identity-system/identity, role=idrepo, templateFields=null, input={ "requesttime": "$TIMESTAMP$", "individualId": "$RANDOMINDIVIDUALIDFORMOCKIDENTITY$", "pin": "545411", "email": "$EMAILIDFORMOCKIDENTITY$", "password": "$PASSWORDFORMOCKIDENTITY$", "phone": "$PHONEFORMOCKIDENTITY$" }, output={ "status":"mock identity data created successfully" }, inputTemplate=esignet/AddIdentityMock/AddIdentity, outputTemplate=esignet/AddIdentityMock/addIdentityResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Add identity with valid parameters VCI Vid, uniqueIdentifier=Dependent_Idrepo_AddIdentity_20, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_AddIdentity_Valid_Params_VCI_uin_Inv_Scen_smoke_Pos |
| Testcase Dependency |
| [] |
| Class Name |
| AddIdentity |
| Testcase Input |
| testCaseName=ESignet_AddIdentity_Valid_Params_VCI_uin_Inv_Scen_smoke_Pos, endPoint=/v1/mock-identity-system/identity, role=idrepo, templateFields=null, input={ "requesttime": "$TIMESTAMP$", "individualId": "$RANDOMINDIVIDUALIDFORMOCKIDENTITY$", "pin": "545411", "email": "$EMAILIDFORMOCKIDENTITY$", "password": "$PASSWORDFORMOCKIDENTITY$", "phone": "$PHONEFORMOCKIDENTITY$" }, output={ "status":"mock identity data created successfully" }, inputTemplate=esignet/AddIdentityMock/AddIdentity, outputTemplate=esignet/AddIdentityMock/addIdentityResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Add identity with valid parameters VCI UIN invalid scenario, uniqueIdentifier=Dependent_Idrepo_AddIdentity_19, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_AddIdentity_Valid_Params_VCI_uin_smoke_Pos |
| Testcase Dependency |
| [] |
| Class Name |
| AddIdentity |
| Testcase Input |
| testCaseName=ESignet_AddIdentity_Valid_Params_VCI_uin_smoke_Pos, endPoint=/v1/mock-identity-system/identity, role=idrepo, templateFields=null, input={ "requesttime": "$TIMESTAMP$", "individualId": "$RANDOMINDIVIDUALIDFORMOCKIDENTITY$", "pin": "545411", "email": "$EMAILIDFORMOCKIDENTITY$", "password": "$PASSWORDFORMOCKIDENTITY$", "phone": "$PHONEFORMOCKIDENTITY$" }, output={ "status":"mock identity data created successfully" }, inputTemplate=esignet/AddIdentityMock/AddIdentity, outputTemplate=esignet/AddIdentityMock/addIdentityResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Add identity with valid parameters VCI UIN, uniqueIdentifier=Dependent_Idrepo_AddIdentity_18, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_AddIdentity_Valid_Params_WOEmail_smoke_Pos |
| Testcase Dependency |
| [] |
| Class Name |
| AddIdentity |
| Testcase Input |
| testCaseName=ESignet_AddIdentity_Valid_Params_WOEmail_smoke_Pos, endPoint=/v1/mock-identity-system/identity, role=idrepo, templateFields=null, input={ "requesttime": "$TIMESTAMP$", "individualId": "$RANDOMINDIVIDUALIDFORMOCKIDENTITY$", "pin": "545411", "email": "$EMAILIDFORMOCKIDENTITY$", "password": "$PASSWORDFORMOCKIDENTITY$", "phone": "$PHONEFORMOCKIDENTITY$" }, output={ "status":"mock identity data created successfully" }, inputTemplate=esignet/AddIdentityMock/AddIdentity, outputTemplate=esignet/AddIdentityMock/addIdentityResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Add identity with valid parameter and without Email, uniqueIdentifier=Dependent_Idrepo_AddIdentity_06, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_AddIdentity_Valid_Params_WOPhone_smoke_Pos |
| Testcase Dependency |
| [] |
| Class Name |
| AddIdentity |
| Testcase Input |
| testCaseName=ESignet_AddIdentity_Valid_Params_WOPhone_smoke_Pos, endPoint=/v1/mock-identity-system/identity, role=idrepo, templateFields=null, input={ "requesttime": "$TIMESTAMP$", "individualId": "$RANDOMINDIVIDUALIDFORMOCKIDENTITY$", "pin": "545411", "email": "$EMAILIDFORMOCKIDENTITY$", "password": "$PASSWORDFORMOCKIDENTITY$", "phone": "$PHONEFORMOCKIDENTITY$" }, output={ "status":"mock identity data created successfully" }, inputTemplate=esignet/AddIdentityMock/AddIdentity, outputTemplate=esignet/AddIdentityMock/addIdentityResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Add identity with valid parameter and without phone number, uniqueIdentifier=Dependent_Idrepo_AddIdentity_05, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_AddIdentity_Vid_2_Generation_smoke_Pos |
| Testcase Dependency |
| [] |
| Class Name |
| AddIdentity |
| Testcase Input |
| testCaseName=ESignet_AddIdentity_Vid_2_Generation_smoke_Pos, endPoint=/v1/mock-identity-system/identity, role=idrepo, templateFields=null, input={ "requesttime": "$TIMESTAMP$", "individualId": "$RANDOMINDIVIDUALIDFORMOCKIDENTITY$", "pin": "545411", "email": "$EMAILIDFORMOCKIDENTITY$", "password": "$PASSWORDFORMOCKIDENTITY$", "phone": "$PHONEFORMOCKIDENTITY$" }, output={ "status":"mock identity data created successfully" }, inputTemplate=esignet/AddIdentityMock/AddIdentity, outputTemplate=esignet/AddIdentityMock/addIdentityResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Add identity Vid generation, uniqueIdentifier=Dependent_Idrepo_AddIdentity_08, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_AddIdentity_Vid_Generation_smoke_Pos |
| Testcase Dependency |
| [] |
| Class Name |
| AddIdentity |
| Testcase Input |
| testCaseName=ESignet_AddIdentity_Vid_Generation_smoke_Pos, endPoint=/v1/mock-identity-system/identity, role=idrepo, templateFields=null, input={ "requesttime": "$TIMESTAMP$", "individualId": "$RANDOMINDIVIDUALIDFORMOCKIDENTITY$", "pin": "545411", "email": "$EMAILIDFORMOCKIDENTITY$", "password": "$PASSWORDFORMOCKIDENTITY$", "phone": "$PHONEFORMOCKIDENTITY$" }, output={ "status":"mock identity data created successfully" }, inputTemplate=esignet/AddIdentityMock/AddIdentity, outputTemplate=esignet/AddIdentityMock/addIdentityResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Add identity Vid generation, uniqueIdentifier=Dependent_Idrepo_AddIdentity_07, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_AddIdentity_BioAuth_smoke_Pos |
| Testcase Dependency |
| [] |
| Class Name |
| AddIdentity |
| Testcase Input |
| testCaseName=ESignet_AddIdentity_BioAuth_smoke_Pos, endPoint=/idrepository/v1/identity/, role=idrepo, templateFields=null, input={ "value": "$BIOVALUE$", "id": "mosip.id.create", "registrationId": "$RID$", "biometricReferenceId": "23452353", "UIN": "$UIN$", "dateOfBirth": "1992/04/15", "postalCode": "14022", "email": "ESignet_AddIdentity_BioAuth_smoke_Pos@mosip.net", "phone": "9876543210", "referenceIdentityNumber": "6789545678878", "version": "v1", "introducerRID": "212124324784879", "introducerUIN": "212124324784879", "category": "individualBiometrics", "requesttime": "$TIMESTAMP$" }, output={ "status":"ACTIVATED" }, inputTemplate=esignet/AddIdentity/addIdentity_$LANGNUMBER$, outputTemplate=esignet/AddIdentity/addIdentityResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Add identity with BioAuth, uniqueIdentifier=Dependent_Idrepo_AddIdentity_14, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:203)
at io.mosip.testrig.apirig.esignet.testscripts.AddIdentity.test(AddIdentity.java:91)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_AddIdentity_Consent_Vid_smoke_Pos |
| Testcase Dependency |
| [] |
| Class Name |
| AddIdentity |
| Testcase Input |
| testCaseName=ESignet_AddIdentity_Consent_Vid_smoke_Pos, endPoint=/idrepository/v1/identity/, role=idrepo, templateFields=null, input={ "value": "$BIOVALUE$", "id": "mosip.id.create", "registrationId": "$RID$", "biometricReferenceId": "23452353", "UIN": "$UIN$", "dateOfBirth": "1992/04/15", "postalCode": "14022", "email": "ESignet_AddIdentity_Consent_Vid_smoke_Pos@mosip.net", "phone": "9876543210", "referenceIdentityNumber": "6789545678878", "version": "v1", "introducerRID": "212124324784879", "introducerUIN": "212124324784879", "category": "individualBiometrics", "requesttime": "$TIMESTAMP$" }, output={ "status":"ACTIVATED" }, inputTemplate=esignet/AddIdentity/addIdentity_$LANGNUMBER$, outputTemplate=esignet/AddIdentity/addIdentityResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Add identity consent Vid, uniqueIdentifier=Dependent_Idrepo_AddIdentity_17, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:203)
at io.mosip.testrig.apirig.esignet.testscripts.AddIdentity.test(AddIdentity.java:91)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_AddIdentity_Consent_smoke_Pos |
| Testcase Dependency |
| [] |
| Class Name |
| AddIdentity |
| Testcase Input |
| testCaseName=ESignet_AddIdentity_Consent_smoke_Pos, endPoint=/idrepository/v1/identity/, role=idrepo, templateFields=null, input={ "value": "$BIOVALUE$", "id": "mosip.id.create", "registrationId": "$RID$", "biometricReferenceId": "23452353", "UIN": "$UIN$", "dateOfBirth": "1992/04/15", "postalCode": "14022", "email": "ESignet_AddIdentity_Consent_smoke_Pos@mosip.net", "phone": "9876543210", "referenceIdentityNumber": "6789545678878", "version": "v1", "introducerRID": "212124324784879", "introducerUIN": "212124324784879", "category": "individualBiometrics", "requesttime": "$TIMESTAMP$" }, output={ "status":"ACTIVATED" }, inputTemplate=esignet/AddIdentity/addIdentity_$LANGNUMBER$, outputTemplate=esignet/AddIdentity/addIdentityResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Add identity consent, uniqueIdentifier=Dependent_Idrepo_AddIdentity_16, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:203)
at io.mosip.testrig.apirig.esignet.testscripts.AddIdentity.test(AddIdentity.java:91)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_AddIdentity_For_DPOP_smoke_Pos |
| Testcase Dependency |
| [] |
| Class Name |
| AddIdentity |
| Testcase Input |
| testCaseName=ESignet_AddIdentity_For_DPOP_smoke_Pos, endPoint=/idrepository/v1/identity/, role=idrepo, templateFields=null, input={ "value": "$BIOVALUE$", "id": "mosip.id.create", "registrationId": "$RID$", "biometricReferenceId": "23452353", "UIN": "$UIN$", "dateOfBirth": "1992/04/15", "postalCode": "14022", "email": "ESignet_AddIdentity_For_DPOP_smoke_Pos@mosip.net", "phone": "9876543210", "referenceIdentityNumber": "6789545678878", "version": "v1", "introducerRID": "212124324784879", "introducerUIN": "212124324784879", "category": "individualBiometrics", "requesttime": "$TIMESTAMP$" }, output={ "status":"ACTIVATED" }, inputTemplate=esignet/AddIdentity/addIdentity_$LANGNUMBER$, outputTemplate=esignet/AddIdentity/addIdentityResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Add identity with all valid parameters for DPOP Smoke test cases, uniqueIdentifier=Dependent_Idrepo_AddIdentity_44, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:203)
at io.mosip.testrig.apirig.esignet.testscripts.AddIdentity.test(AddIdentity.java:91)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_AddIdentity_For_OTPFlow_VerifiedClaims_smoke_Pos |
| Testcase Dependency |
| [] |
| Class Name |
| AddIdentity |
| Testcase Input |
| testCaseName=ESignet_AddIdentity_For_OTPFlow_VerifiedClaims_smoke_Pos, endPoint=/idrepository/v1/identity/, role=idrepo, templateFields=null, input={ "value": "$BIOVALUE$", "id": "mosip.id.create", "registrationId": "$RID$", "biometricReferenceId": "23452353", "UIN": "$UIN$", "dateOfBirth": "1992/04/15", "postalCode": "14022", "email": "ESignet_AddIdentity_For_OTPFlow_VerifiedClaims_smoke_Pos@mosip.net", "phone": "9876543210", "referenceIdentityNumber": "6789545678878", "version": "v1", "introducerRID": "212124324784879", "introducerUIN": "212124324784879", "category": "individualBiometrics", "requesttime": "$TIMESTAMP$" }, output={ "status":"ACTIVATED" }, inputTemplate=esignet/AddIdentity/addIdentity_$LANGNUMBER$, outputTemplate=esignet/AddIdentity/addIdentityResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Add identity with all valid parameters for OTP Flow Verified Claims, uniqueIdentifier=Dependent_Idrepo_AddIdentity_45, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:203)
at io.mosip.testrig.apirig.esignet.testscripts.AddIdentity.test(AddIdentity.java:91)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_AddIdentity_For_OTPFlow_WithoutVerifiedClaims_smoke_Pos |
| Testcase Dependency |
| [] |
| Class Name |
| AddIdentity |
| Testcase Input |
| testCaseName=ESignet_AddIdentity_For_OTPFlow_WithoutVerifiedClaims_smoke_Pos, endPoint=/idrepository/v1/identity/, role=idrepo, templateFields=null, input={ "value": "$BIOVALUE$", "id": "mosip.id.create", "registrationId": "$RID$", "biometricReferenceId": "23452353", "UIN": "$UIN$", "dateOfBirth": "1992/04/15", "postalCode": "14022", "email": "ESignet_AddIdentity_For_OTPFlow_WithoutVerifiedClaims_smoke_Pos@mosip.net", "phone": "9876543210", "referenceIdentityNumber": "6789545678878", "version": "v1", "introducerRID": "212124324784879", "introducerUIN": "212124324784879", "category": "individualBiometrics", "requesttime": "$TIMESTAMP$" }, output={ "status":"ACTIVATED" }, inputTemplate=esignet/AddIdentity/addIdentity_$LANGNUMBER$, outputTemplate=esignet/AddIdentity/addIdentityResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Add identity with all valid parameters for OTP Flow Without Verified Claims, uniqueIdentifier=Dependent_Idrepo_AddIdentity_46, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:203)
at io.mosip.testrig.apirig.esignet.testscripts.AddIdentity.test(AddIdentity.java:91)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_AddIdentity_For_PAR_smoke_Pos |
| Testcase Dependency |
| [] |
| Class Name |
| AddIdentity |
| Testcase Input |
| testCaseName=ESignet_AddIdentity_For_PAR_smoke_Pos, endPoint=/idrepository/v1/identity/, role=idrepo, templateFields=null, input={ "value": "$BIOVALUE$", "id": "mosip.id.create", "registrationId": "$RID$", "biometricReferenceId": "23452353", "UIN": "$UIN$", "dateOfBirth": "1992/04/15", "postalCode": "14022", "email": "ESignet_AddIdentity_For_PAR_smoke_Pos@mosip.net", "phone": "9876543210", "referenceIdentityNumber": "6789545678878", "version": "v1", "introducerRID": "212124324784879", "introducerUIN": "212124324784879", "category": "individualBiometrics", "requesttime": "$TIMESTAMP$" }, output={ "status":"ACTIVATED" }, inputTemplate=esignet/AddIdentity/addIdentity_$LANGNUMBER$, outputTemplate=esignet/AddIdentity/addIdentityResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Add identity with all valid parameters for PAR Smoke test cases, uniqueIdentifier=Dependent_Idrepo_AddIdentity_43, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:203)
at io.mosip.testrig.apirig.esignet.testscripts.AddIdentity.test(AddIdentity.java:91)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_AddIdentity_Invalid_Scen_smoke_Pos |
| Testcase Dependency |
| [] |
| Class Name |
| AddIdentity |
| Testcase Input |
| testCaseName=ESignet_AddIdentity_Invalid_Scen_smoke_Pos, endPoint=/idrepository/v1/identity/, role=idrepo, templateFields=null, input={ "value": "$BIOVALUE$", "id": "mosip.id.create", "registrationId": "$RID$", "biometricReferenceId": "23452353", "UIN": "$UIN$", "dateOfBirth": "1992/04/15", "postalCode": "14022", "email": "ESignet_AddIdentity_Invalid_Scen_smoke_Pos@mosip.net", "phone": "9876543210", "referenceIdentityNumber": "6789545678878", "version": "v1", "introducerRID": "212124324784879", "introducerUIN": "212124324784879", "category": "individualBiometrics", "requesttime": "$TIMESTAMP$" }, output={ "status":"ACTIVATED" }, inputTemplate=esignet/AddIdentity/addIdentity_$LANGNUMBER$, outputTemplate=esignet/AddIdentity/addIdentityResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Add identity with invalid scenario, uniqueIdentifier=Dependent_Idrepo_AddIdentity_03, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:203)
at io.mosip.testrig.apirig.esignet.testscripts.AddIdentity.test(AddIdentity.java:91)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_AddIdentity_KycAuth_smoke_Pos |
| Testcase Dependency |
| [] |
| Class Name |
| AddIdentity |
| Testcase Input |
| testCaseName=ESignet_AddIdentity_KycAuth_smoke_Pos, endPoint=/idrepository/v1/identity/, role=idrepo, templateFields=null, input={ "value": "$BIOVALUE$", "id": "mosip.id.create", "registrationId": "$RID$", "biometricReferenceId": "23452353", "UIN": "$UIN$", "dateOfBirth": "1992/04/15", "postalCode": "14022", "email": "ESignet_AddIdentity_KycAuth_smoke_Pos@mosip.net", "phone": "9876543210", "referenceIdentityNumber": "6789545678878", "version": "v1", "introducerRID": "212124324784879", "introducerUIN": "212124324784879", "category": "individualBiometrics", "requesttime": "$TIMESTAMP$" }, output={ "status":"ACTIVATED" }, inputTemplate=esignet/AddIdentity/addIdentity_$LANGNUMBER$, outputTemplate=esignet/AddIdentity/addIdentityResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Add identity with KycAuth, uniqueIdentifier=Dependent_Idrepo_AddIdentity_15, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:203)
at io.mosip.testrig.apirig.esignet.testscripts.AddIdentity.test(AddIdentity.java:91)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_AddIdentity_L2_Valid_Parameters_ForOnlyEssentialclaims_Pos |
| Testcase Dependency |
| [] |
| Class Name |
| AddIdentity |
| Testcase Input |
| testCaseName=ESignet_AddIdentity_L2_Valid_Parameters_ForOnlyEssentialclaims_Pos, endPoint=/idrepository/v1/identity/, role=idrepo, templateFields=null, input={ "value": "$BIOVALUE$", "id": "mosip.id.create", "registrationId": "$RID$", "biometricReferenceId": "23452353", "UIN": "$UIN$", "dateOfBirth": "1992/04/15", "postalCode": "14022", "email": "ESignet_AddIdentity_L2_Valid_Parameters_ForOnlyEssentialclaims_Pos@mosip.net", "phone": "9876543210", "referenceIdentityNumber": "6789545678878", "version": "v1", "introducerRID": "212124324784879", "introducerUIN": "212124324784879", "category": "individualBiometrics", "requesttime": "$TIMESTAMP$" }, output={ "status":"ACTIVATED" }, inputTemplate=esignet/AddIdentity/addIdentity_$LANGNUMBER$, outputTemplate=esignet/AddIdentity/addIdentityResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Add identity with all valid parameters, uniqueIdentifier=Dependent_Idrepo_AddIdentity_39, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:203)
at io.mosip.testrig.apirig.esignet.testscripts.AddIdentity.test(AddIdentity.java:91)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_AddIdentity_L2_Valid_Parameters_ForPartialEseentialAndOptionalClaim_Pos |
| Testcase Dependency |
| [] |
| Class Name |
| AddIdentity |
| Testcase Input |
| testCaseName=ESignet_AddIdentity_L2_Valid_Parameters_ForPartialEseentialAndOptionalClaim_Pos, endPoint=/idrepository/v1/identity/, role=idrepo, templateFields=null, input={ "value": "$BIOVALUE$", "id": "mosip.id.create", "registrationId": "$RID$", "biometricReferenceId": "23452353", "UIN": "$UIN$", "dateOfBirth": "1992/04/15", "postalCode": "14022", "email": "ESignet_AddIdentity_L2_Valid_Parameters_ForPartialEseentialAndOptionalClaim_Pos@mosip.net", "phone": "9876543210", "referenceIdentityNumber": "6789545678878", "version": "v1", "introducerRID": "212124324784879", "introducerUIN": "212124324784879", "category": "individualBiometrics", "requesttime": "$TIMESTAMP$" }, output={ "status":"ACTIVATED" }, inputTemplate=esignet/AddIdentity/addIdentity_$LANGNUMBER$, outputTemplate=esignet/AddIdentity/addIdentityResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Add identity with all valid parameters, uniqueIdentifier=Dependent_Idrepo_AddIdentity_38, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:203)
at io.mosip.testrig.apirig.esignet.testscripts.AddIdentity.test(AddIdentity.java:91)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_AddIdentity_L2_Valid_Parameters_OnlyOptionalClaim_IfEssAndOptAsRequestedClaim_Pos |
| Testcase Dependency |
| [] |
| Class Name |
| AddIdentity |
| Testcase Input |
| testCaseName=ESignet_AddIdentity_L2_Valid_Parameters_OnlyOptionalClaim_IfEssAndOptAsRequestedClaim_Pos, endPoint=/idrepository/v1/identity/, role=idrepo, templateFields=null, input={ "value": "$BIOVALUE$", "id": "mosip.id.create", "registrationId": "$RID$", "biometricReferenceId": "23452353", "UIN": "$UIN$", "dateOfBirth": "1992/04/15", "postalCode": "14022", "email": "ESignet_AddIdentity_L2_Valid_Parameters_OnlyOptionalClaim_IfEssAndOptAsRequestedClaim_Pos@mosip.net", "phone": "9876543210", "referenceIdentityNumber": "6789545678878", "version": "v1", "introducerRID": "212124324784879", "introducerUIN": "212124324784879", "category": "individualBiometrics", "requesttime": "$TIMESTAMP$" }, output={ "status":"ACTIVATED" }, inputTemplate=esignet/AddIdentity/addIdentity_$LANGNUMBER$, outputTemplate=esignet/AddIdentity/addIdentityResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Add identity with all valid parameters, uniqueIdentifier=Dependent_Idrepo_AddIdentity_37, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:203)
at io.mosip.testrig.apirig.esignet.testscripts.AddIdentity.test(AddIdentity.java:91)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_AddIdentity_L2_Valid_Parameters_consent_authcode_Pos |
| Testcase Dependency |
| [] |
| Class Name |
| AddIdentity |
| Testcase Input |
| testCaseName=ESignet_AddIdentity_L2_Valid_Parameters_consent_authcode_Pos, endPoint=/idrepository/v1/identity/, role=idrepo, templateFields=null, input={ "value": "$BIOVALUE$", "id": "mosip.id.create", "registrationId": "$RID$", "biometricReferenceId": "23452353", "UIN": "$UIN$", "dateOfBirth": "1992/04/15", "postalCode": "14022", "email": "ESignet_AddIdentity_L2_Valid_Parameters_consent_authcode_Pos@mosip.net", "phone": "9876543210", "referenceIdentityNumber": "6789545678878", "version": "v1", "introducerRID": "212124324784879", "introducerUIN": "212124324784879", "category": "individualBiometrics", "requesttime": "$TIMESTAMP$" }, output={ "status":"ACTIVATED" }, inputTemplate=esignet/AddIdentity/addIdentity_$LANGNUMBER$, outputTemplate=esignet/AddIdentity/addIdentityResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Add identity with all valid parameters, uniqueIdentifier=Dependent_Idrepo_AddIdentity_28, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:203)
at io.mosip.testrig.apirig.esignet.testscripts.AddIdentity.test(AddIdentity.java:91)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_AddIdentity_L2_Valid_Parameters_forEmptyAcceptedClaimIfRequestedIsOptional_Pos |
| Testcase Dependency |
| [] |
| Class Name |
| AddIdentity |
| Testcase Input |
| testCaseName=ESignet_AddIdentity_L2_Valid_Parameters_forEmptyAcceptedClaimIfRequestedIsOptional_Pos, endPoint=/idrepository/v1/identity/, role=idrepo, templateFields=null, input={ "value": "$BIOVALUE$", "id": "mosip.id.create", "registrationId": "$RID$", "biometricReferenceId": "23452353", "UIN": "$UIN$", "dateOfBirth": "1992/04/15", "postalCode": "14022", "email": "ESignet_AddIdentity_L2_Valid_Parameters_forEmptyAcceptedClaimIfRequestedIsOptional_Pos@mosip.net", "phone": "9876543210", "referenceIdentityNumber": "6789545678878", "version": "v1", "introducerRID": "212124324784879", "introducerUIN": "212124324784879", "category": "individualBiometrics", "requesttime": "$TIMESTAMP$" }, output={ "status":"ACTIVATED" }, inputTemplate=esignet/AddIdentity/addIdentity_$LANGNUMBER$, outputTemplate=esignet/AddIdentity/addIdentityResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Add identity with all valid parameters, uniqueIdentifier=Dependent_Idrepo_AddIdentity_42, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:203)
at io.mosip.testrig.apirig.esignet.testscripts.AddIdentity.test(AddIdentity.java:91)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_AddIdentity_L2_Valid_Parameters_forEmptyAsAcceptedClaim_Pos |
| Testcase Dependency |
| [] |
| Class Name |
| AddIdentity |
| Testcase Input |
| testCaseName=ESignet_AddIdentity_L2_Valid_Parameters_forEmptyAsAcceptedClaim_Pos, endPoint=/idrepository/v1/identity/, role=idrepo, templateFields=null, input={ "value": "$BIOVALUE$", "id": "mosip.id.create", "registrationId": "$RID$", "biometricReferenceId": "23452353", "UIN": "$UIN$", "dateOfBirth": "1992/04/15", "postalCode": "14022", "email": "ESignet_AddIdentity_L2_Valid_Parameters_forEmptyAsAcceptedClaim_Pos@mosip.net", "phone": "9876543210", "referenceIdentityNumber": "6789545678878", "version": "v1", "introducerRID": "212124324784879", "introducerUIN": "212124324784879", "category": "individualBiometrics", "requesttime": "$TIMESTAMP$" }, output={ "status":"ACTIVATED" }, inputTemplate=esignet/AddIdentity/addIdentity_$LANGNUMBER$, outputTemplate=esignet/AddIdentity/addIdentityResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Add identity with all valid parameters, uniqueIdentifier=Dependent_Idrepo_AddIdentity_40, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:203)
at io.mosip.testrig.apirig.esignet.testscripts.AddIdentity.test(AddIdentity.java:91)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_AddIdentity_L2_Valid_Parameters_forInvalidAcceptedClaims_Pos |
| Testcase Dependency |
| [] |
| Class Name |
| AddIdentity |
| Testcase Input |
| testCaseName=ESignet_AddIdentity_L2_Valid_Parameters_forInvalidAcceptedClaims_Pos, endPoint=/idrepository/v1/identity/, role=idrepo, templateFields=null, input={ "value": "$BIOVALUE$", "id": "mosip.id.create", "registrationId": "$RID$", "biometricReferenceId": "23452353", "UIN": "$UIN$", "dateOfBirth": "1992/04/15", "postalCode": "14022", "email": "ESignet_AddIdentity_L2_Valid_Parameters_forInvalidAcceptedClaims_Pos@mosip.net", "phone": "9876543210", "referenceIdentityNumber": "6789545678878", "version": "v1", "introducerRID": "212124324784879", "introducerUIN": "212124324784879", "category": "individualBiometrics", "requesttime": "$TIMESTAMP$" }, output={ "status":"ACTIVATED" }, inputTemplate=esignet/AddIdentity/addIdentity_$LANGNUMBER$, outputTemplate=esignet/AddIdentity/addIdentityResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Add identity with all valid parameters, uniqueIdentifier=Dependent_Idrepo_AddIdentity_36, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:203)
at io.mosip.testrig.apirig.esignet.testscripts.AddIdentity.test(AddIdentity.java:91)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_AddIdentity_L2_Valid_Parameters_forOnlyOptionalClaimIfRequestedOptional_Pos |
| Testcase Dependency |
| [] |
| Class Name |
| AddIdentity |
| Testcase Input |
| testCaseName=ESignet_AddIdentity_L2_Valid_Parameters_forOnlyOptionalClaimIfRequestedOptional_Pos, endPoint=/idrepository/v1/identity/, role=idrepo, templateFields=null, input={ "value": "$BIOVALUE$", "id": "mosip.id.create", "registrationId": "$RID$", "biometricReferenceId": "23452353", "UIN": "$UIN$", "dateOfBirth": "1992/04/15", "postalCode": "14022", "email": "ESignet_AddIdentity_L2_Valid_Parameters_forOnlyOptionalClaimIfRequestedOptional_Pos@mosip.net", "phone": "9876543210", "referenceIdentityNumber": "6789545678878", "version": "v1", "introducerRID": "212124324784879", "introducerUIN": "212124324784879", "category": "individualBiometrics", "requesttime": "$TIMESTAMP$" }, output={ "status":"ACTIVATED" }, inputTemplate=esignet/AddIdentity/addIdentity_$LANGNUMBER$, outputTemplate=esignet/AddIdentity/addIdentityResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Add identity with all valid parameters, uniqueIdentifier=Dependent_Idrepo_AddIdentity_41, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:203)
at io.mosip.testrig.apirig.esignet.testscripts.AddIdentity.test(AddIdentity.java:91)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_AddIdentity_L2_Valid_Parameters_forUserInfoJWE_smoke_Pos |
| Testcase Dependency |
| [] |
| Class Name |
| AddIdentity |
| Testcase Input |
| testCaseName=ESignet_AddIdentity_L2_Valid_Parameters_forUserInfoJWE_smoke_Pos, endPoint=/idrepository/v1/identity/, role=idrepo, templateFields=null, input={ "value": "$BIOVALUE$", "id": "mosip.id.create", "registrationId": "$RID$", "biometricReferenceId": "23452353", "UIN": "$UIN$", "dateOfBirth": "1992/04/15", "postalCode": "14022", "email": "ESignet_AddIdentity_L2_Valid_Parameters_forUserInfoJWE_smoke_Pos@mosip.net", "phone": "9876543210", "referenceIdentityNumber": "6789545678878", "version": "v1", "introducerRID": "212124324784879", "introducerUIN": "212124324784879", "category": "individualBiometrics", "requesttime": "$TIMESTAMP$" }, output={ "status":"ACTIVATED" }, inputTemplate=esignet/AddIdentity/addIdentity_$LANGNUMBER$, outputTemplate=esignet/AddIdentity/addIdentityResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Add identity with all valid parameters, uniqueIdentifier=Dependent_Idrepo_AddIdentity_26, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:203)
at io.mosip.testrig.apirig.esignet.testscripts.AddIdentity.test(AddIdentity.java:91)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_AddIdentity_L2_Valid_Parameters_forUserInfoUpdatedJWE_smoke_Pos |
| Testcase Dependency |
| [] |
| Class Name |
| AddIdentity |
| Testcase Input |
| testCaseName=ESignet_AddIdentity_L2_Valid_Parameters_forUserInfoUpdatedJWE_smoke_Pos, endPoint=/idrepository/v1/identity/, role=idrepo, templateFields=null, input={ "value": "$BIOVALUE$", "id": "mosip.id.create", "registrationId": "$RID$", "biometricReferenceId": "23452353", "UIN": "$UIN$", "dateOfBirth": "1992/04/15", "postalCode": "14022", "email": "ESignet_AddIdentity_L2_Valid_Parameters_forUserInfoUpdatedJWE_smoke_Pos@mosip.net", "phone": "9876543210", "referenceIdentityNumber": "6789545678878", "version": "v1", "introducerRID": "212124324784879", "introducerUIN": "212124324784879", "category": "individualBiometrics", "requesttime": "$TIMESTAMP$" }, output={ "status":"ACTIVATED" }, inputTemplate=esignet/AddIdentity/addIdentity_$LANGNUMBER$, outputTemplate=esignet/AddIdentity/addIdentityResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Add identity with all valid parameters, uniqueIdentifier=Dependent_Idrepo_AddIdentity_27, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:203)
at io.mosip.testrig.apirig.esignet.testscripts.AddIdentity.test(AddIdentity.java:91)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_AddIdentity_L2_Valid_Parameters_forUserInfo_smoke_Pos |
| Testcase Dependency |
| [] |
| Class Name |
| AddIdentity |
| Testcase Input |
| testCaseName=ESignet_AddIdentity_L2_Valid_Parameters_forUserInfo_smoke_Pos, endPoint=/idrepository/v1/identity/, role=idrepo, templateFields=null, input={ "value": "$BIOVALUE$", "id": "mosip.id.create", "registrationId": "$RID$", "biometricReferenceId": "23452353", "UIN": "$UIN$", "dateOfBirth": "1992/04/15", "postalCode": "14022", "email": "ESignet_AddIdentity_L2_Valid_Parameters_forUserInfo_smoke_Pos@mosip.net", "phone": "9876543210", "referenceIdentityNumber": "6789545678878", "version": "v1", "introducerRID": "212124324784879", "introducerUIN": "212124324784879", "category": "individualBiometrics", "requesttime": "$TIMESTAMP$" }, output={ "status":"ACTIVATED" }, inputTemplate=esignet/AddIdentity/addIdentity_$LANGNUMBER$, outputTemplate=esignet/AddIdentity/addIdentityResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Add identity with all valid parameters, uniqueIdentifier=Dependent_Idrepo_AddIdentity_25, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:203)
at io.mosip.testrig.apirig.esignet.testscripts.AddIdentity.test(AddIdentity.java:91)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_AddIdentity_L2_Valid_Parameters_linkedconsent_forAcceptedClaims_Pos |
| Testcase Dependency |
| [] |
| Class Name |
| AddIdentity |
| Testcase Input |
| testCaseName=ESignet_AddIdentity_L2_Valid_Parameters_linkedconsent_forAcceptedClaims_Pos, endPoint=/idrepository/v1/identity/, role=idrepo, templateFields=null, input={ "value": "$BIOVALUE$", "id": "mosip.id.create", "registrationId": "$RID$", "biometricReferenceId": "23452353", "UIN": "$UIN$", "dateOfBirth": "1992/04/15", "postalCode": "14022", "email": "ESignet_AddIdentity_L2_Valid_Parameters_linkedconsent_forAcceptedClaims_Pos@mosip.net", "phone": "9876543210", "referenceIdentityNumber": "6789545678878", "version": "v1", "introducerRID": "212124324784879", "introducerUIN": "212124324784879", "category": "individualBiometrics", "requesttime": "$TIMESTAMP$" }, output={ "status":"ACTIVATED" }, inputTemplate=esignet/AddIdentity/addIdentity_$LANGNUMBER$, outputTemplate=esignet/AddIdentity/addIdentityResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Add identity with all valid parameters, uniqueIdentifier=Dependent_Idrepo_AddIdentity_29, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:203)
at io.mosip.testrig.apirig.esignet.testscripts.AddIdentity.test(AddIdentity.java:91)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_AddIdentity_L2_Valid_Parameters_linkedconsent_forOptionalClaims_Pos |
| Testcase Dependency |
| [] |
| Class Name |
| AddIdentity |
| Testcase Input |
| testCaseName=ESignet_AddIdentity_L2_Valid_Parameters_linkedconsent_forOptionalClaims_Pos, endPoint=/idrepository/v1/identity/, role=idrepo, templateFields=null, input={ "value": "$BIOVALUE$", "id": "mosip.id.create", "registrationId": "$RID$", "biometricReferenceId": "23452353", "UIN": "$UIN$", "dateOfBirth": "1992/04/15", "postalCode": "14022", "email": "ESignet_AddIdentity_L2_Valid_Parameters_linkedconsent_forOptionalClaims_Pos@mosip.net", "phone": "9876543210", "referenceIdentityNumber": "6789545678878", "version": "v1", "introducerRID": "212124324784879", "introducerUIN": "212124324784879", "category": "individualBiometrics", "requesttime": "$TIMESTAMP$" }, output={ "status":"ACTIVATED" }, inputTemplate=esignet/AddIdentity/addIdentity_$LANGNUMBER$, outputTemplate=esignet/AddIdentity/addIdentityResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Add identity with all valid parameters, uniqueIdentifier=Dependent_Idrepo_AddIdentity_30, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:203)
at io.mosip.testrig.apirig.esignet.testscripts.AddIdentity.test(AddIdentity.java:91)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_AddIdentity_L2_Valid_Parameters_linkedconsent_forPartialEssentialOptionalClaims_Pos |
| Testcase Dependency |
| [] |
| Class Name |
| AddIdentity |
| Testcase Input |
| testCaseName=ESignet_AddIdentity_L2_Valid_Parameters_linkedconsent_forPartialEssentialOptionalClaims_Pos, endPoint=/idrepository/v1/identity/, role=idrepo, templateFields=null, input={ "value": "$BIOVALUE$", "id": "mosip.id.create", "registrationId": "$RID$", "biometricReferenceId": "23452353", "UIN": "$UIN$", "dateOfBirth": "1992/04/15", "postalCode": "14022", "email": "ESignet_AddIdentity_L2_Valid_Parameters_linkedconsent_forPartialEssentialOptionalClaims_Pos@mosip.net", "phone": "9876543210", "referenceIdentityNumber": "6789545678878", "version": "v1", "introducerRID": "212124324784879", "introducerUIN": "212124324784879", "category": "individualBiometrics", "requesttime": "$TIMESTAMP$" }, output={ "status":"ACTIVATED" }, inputTemplate=esignet/AddIdentity/addIdentity_$LANGNUMBER$, outputTemplate=esignet/AddIdentity/addIdentityResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Add identity with all valid parameters, uniqueIdentifier=Dependent_Idrepo_AddIdentity_31, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:203)
at io.mosip.testrig.apirig.esignet.testscripts.AddIdentity.test(AddIdentity.java:91)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_AddIdentity_L2_Valid_Parameters_linkedconsent_for_OnlyOptionalClaimAsRequested_AcceptedClaim_Pos |
| Testcase Dependency |
| [] |
| Class Name |
| AddIdentity |
| Testcase Input |
| testCaseName=ESignet_AddIdentity_L2_Valid_Parameters_linkedconsent_for_OnlyOptionalClaimAsRequested_AcceptedClaim_Pos, endPoint=/idrepository/v1/identity/, role=idrepo, templateFields=null, input={ "value": "$BIOVALUE$", "id": "mosip.id.create", "registrationId": "$RID$", "biometricReferenceId": "23452353", "UIN": "$UIN$", "dateOfBirth": "1992/04/15", "postalCode": "14022", "email": "ESignet_AddIdentity_L2_Valid_Parameters_linkedconsent_for_OnlyOptionalClaimAsRequested_AcceptedClaim_Pos@mosip.net", "phone": "9876543210", "referenceIdentityNumber": "6789545678878", "version": "v1", "introducerRID": "212124324784879", "introducerUIN": "212124324784879", "category": "individualBiometrics", "requesttime": "$TIMESTAMP$" }, output={ "status":"ACTIVATED" }, inputTemplate=esignet/AddIdentity/addIdentity_$LANGNUMBER$, outputTemplate=esignet/AddIdentity/addIdentityResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Add identity with all valid parameters, uniqueIdentifier=Dependent_Idrepo_AddIdentity_34, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:203)
at io.mosip.testrig.apirig.esignet.testscripts.AddIdentity.test(AddIdentity.java:91)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_AddIdentity_L2_Valid_Parameters_linkedconsent_for_null_asEssentialClaims_AcceptedClaim_Pos |
| Testcase Dependency |
| [] |
| Class Name |
| AddIdentity |
| Testcase Input |
| testCaseName=ESignet_AddIdentity_L2_Valid_Parameters_linkedconsent_for_null_asEssentialClaims_AcceptedClaim_Pos, endPoint=/idrepository/v1/identity/, role=idrepo, templateFields=null, input={ "value": "$BIOVALUE$", "id": "mosip.id.create", "registrationId": "$RID$", "biometricReferenceId": "23452353", "UIN": "$UIN$", "dateOfBirth": "1992/04/15", "postalCode": "14022", "email": "ESignet_AddIdentity_L2_Valid_Parameters_linkedconsent_for_null_asEssentialClaims_AcceptedClaim_Pos@mosip.net", "phone": "9876543210", "referenceIdentityNumber": "6789545678878", "version": "v1", "introducerRID": "212124324784879", "introducerUIN": "212124324784879", "category": "individualBiometrics", "requesttime": "$TIMESTAMP$" }, output={ "status":"ACTIVATED" }, inputTemplate=esignet/AddIdentity/addIdentity_$LANGNUMBER$, outputTemplate=esignet/AddIdentity/addIdentityResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Add identity with all valid parameters, uniqueIdentifier=Dependent_Idrepo_AddIdentity_33, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:203)
at io.mosip.testrig.apirig.esignet.testscripts.AddIdentity.test(AddIdentity.java:91)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_AddIdentity_L2_Valid_Parameters_linkedconsent_for_without_AcceptedClaim_IfOnlyOptionalRequested_Pos |
| Testcase Dependency |
| [] |
| Class Name |
| AddIdentity |
| Testcase Input |
| testCaseName=ESignet_AddIdentity_L2_Valid_Parameters_linkedconsent_for_without_AcceptedClaim_IfOnlyOptionalRequested_Pos, endPoint=/idrepository/v1/identity/, role=idrepo, templateFields=null, input={ "value": "$BIOVALUE$", "id": "mosip.id.create", "registrationId": "$RID$", "biometricReferenceId": "23452353", "UIN": "$UIN$", "dateOfBirth": "1992/04/15", "postalCode": "14022", "email": "ESignet_AddIdentity_L2_Valid_Parameters_linkedconsent_for_without_AcceptedClaim_IfOnlyOptionalRequested_Pos@mosip.net", "phone": "9876543210", "referenceIdentityNumber": "6789545678878", "version": "v1", "introducerRID": "212124324784879", "introducerUIN": "212124324784879", "category": "individualBiometrics", "requesttime": "$TIMESTAMP$" }, output={ "status":"ACTIVATED" }, inputTemplate=esignet/AddIdentity/addIdentity_$LANGNUMBER$, outputTemplate=esignet/AddIdentity/addIdentityResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Add identity with all valid parameters, uniqueIdentifier=Dependent_Idrepo_AddIdentity_35, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:203)
at io.mosip.testrig.apirig.esignet.testscripts.AddIdentity.test(AddIdentity.java:91)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_AddIdentity_L2_Valid_Parameters_linkedconsent_foronlyEssentialClaims_Pos |
| Testcase Dependency |
| [] |
| Class Name |
| AddIdentity |
| Testcase Input |
| testCaseName=ESignet_AddIdentity_L2_Valid_Parameters_linkedconsent_foronlyEssentialClaims_Pos, endPoint=/idrepository/v1/identity/, role=idrepo, templateFields=null, input={ "value": "$BIOVALUE$", "id": "mosip.id.create", "registrationId": "$RID$", "biometricReferenceId": "23452353", "UIN": "$UIN$", "dateOfBirth": "1992/04/15", "postalCode": "14022", "email": "ESignet_AddIdentity_L2_Valid_Parameters_linkedconsent_foronlyEssentialClaims_Pos@mosip.net", "phone": "9876543210", "referenceIdentityNumber": "6789545678878", "version": "v1", "introducerRID": "212124324784879", "introducerUIN": "212124324784879", "category": "individualBiometrics", "requesttime": "$TIMESTAMP$" }, output={ "status":"ACTIVATED" }, inputTemplate=esignet/AddIdentity/addIdentity_$LANGNUMBER$, outputTemplate=esignet/AddIdentity/addIdentityResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Add identity with all valid parameters, uniqueIdentifier=Dependent_Idrepo_AddIdentity_32, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:203)
at io.mosip.testrig.apirig.esignet.testscripts.AddIdentity.test(AddIdentity.java:91)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_AddIdentity_L2_Valid_Parameters_smoke_Neg_Pos |
| Testcase Dependency |
| [] |
| Class Name |
| AddIdentity |
| Testcase Input |
| testCaseName=ESignet_AddIdentity_L2_Valid_Parameters_smoke_Neg_Pos, endPoint=/idrepository/v1/identity/, role=idrepo, templateFields=null, input={ "value": "$BIOVALUE$", "id": "mosip.id.create", "registrationId": "$RID$", "biometricReferenceId": "23452353", "UIN": "$UIN$", "dateOfBirth": "1992/04/15", "postalCode": "14022", "email": "ESignet_AddIdentity_L2_Valid_Parameters_smoke_Neg_Pos@mosip.net", "phone": "9876543210", "referenceIdentityNumber": "6789545678878", "version": "v1", "introducerRID": "212124324784879", "introducerUIN": "212124324784879", "category": "individualBiometrics", "requesttime": "$TIMESTAMP$" }, output={ "status":"ACTIVATED" }, inputTemplate=esignet/AddIdentity/addIdentity_$LANGNUMBER$, outputTemplate=esignet/AddIdentity/addIdentityResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Add identity with all valid parameters, uniqueIdentifier=Dependent_Idrepo_AddIdentity_24, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:203)
at io.mosip.testrig.apirig.esignet.testscripts.AddIdentity.test(AddIdentity.java:91)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_AddIdentity_L2_Valid_Parameters_smoke_Pos |
| Testcase Dependency |
| [] |
| Class Name |
| AddIdentity |
| Testcase Input |
| testCaseName=ESignet_AddIdentity_L2_Valid_Parameters_smoke_Pos, endPoint=/idrepository/v1/identity/, role=idrepo, templateFields=null, input={ "value": "$BIOVALUE$", "id": "mosip.id.create", "registrationId": "$RID$", "biometricReferenceId": "23452353", "UIN": "$UIN$", "dateOfBirth": "1992/04/15", "postalCode": "14022", "email": "ESignet_AddIdentity_L2_Valid_Parameters_smoke_Pos@mosip.net", "phone": "9876543210", "referenceIdentityNumber": "6789545678878", "version": "v1", "introducerRID": "212124324784879", "introducerUIN": "212124324784879", "category": "individualBiometrics", "requesttime": "$TIMESTAMP$" }, output={ "status":"ACTIVATED" }, inputTemplate=esignet/AddIdentity/addIdentity_$LANGNUMBER$, outputTemplate=esignet/AddIdentity/addIdentityResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Add identity with all valid parameters, uniqueIdentifier=Dependent_Idrepo_AddIdentity_23, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:203)
at io.mosip.testrig.apirig.esignet.testscripts.AddIdentity.test(AddIdentity.java:91)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_AddIdentity_Linked_Consent_User2_Vid_smoke_Pos |
| Testcase Dependency |
| [] |
| Class Name |
| AddIdentity |
| Testcase Input |
| testCaseName=ESignet_AddIdentity_Linked_Consent_User2_Vid_smoke_Pos, endPoint=/idrepository/v1/identity/, role=idrepo, templateFields=null, input={ "value": "$BIOVALUE$", "id": "mosip.id.create", "registrationId": "$RID$", "biometricReferenceId": "23452353", "UIN": "$UIN$", "dateOfBirth": "1992/04/15", "postalCode": "14022", "email": "ESignet_AddIdentity_Linked_Consent_User2_Vid_smoke_Pos@mosip.net", "phone": "9876543210", "referenceIdentityNumber": "6789545678878", "version": "v1", "introducerRID": "212124324784879", "introducerUIN": "212124324784879", "category": "individualBiometrics", "requesttime": "$TIMESTAMP$" }, output={ "status":"ACTIVATED" }, inputTemplate=esignet/AddIdentity/addIdentity_$LANGNUMBER$, outputTemplate=esignet/AddIdentity/addIdentityResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Add identity linked consent user2 Vid, uniqueIdentifier=Dependent_Idrepo_AddIdentity_13, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:203)
at io.mosip.testrig.apirig.esignet.testscripts.AddIdentity.test(AddIdentity.java:91)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_AddIdentity_Linked_Consent_User2_smoke_Pos |
| Testcase Dependency |
| [] |
| Class Name |
| AddIdentity |
| Testcase Input |
| testCaseName=ESignet_AddIdentity_Linked_Consent_User2_smoke_Pos, endPoint=/idrepository/v1/identity/, role=idrepo, templateFields=null, input={ "value": "$BIOVALUE$", "id": "mosip.id.create", "registrationId": "$RID$", "biometricReferenceId": "23452353", "UIN": "$UIN$", "dateOfBirth": "1992/04/15", "postalCode": "14022", "email": "ESignet_AddIdentity_Linked_Consent_User2_smoke_Pos@mosip.net", "phone": "9876543210", "referenceIdentityNumber": "6789545678878", "version": "v1", "introducerRID": "212124324784879", "introducerUIN": "212124324784879", "category": "individualBiometrics", "requesttime": "$TIMESTAMP$" }, output={ "status":"ACTIVATED" }, inputTemplate=esignet/AddIdentity/addIdentity_$LANGNUMBER$, outputTemplate=esignet/AddIdentity/addIdentityResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Add identity linked consent user2, uniqueIdentifier=Dependent_Idrepo_AddIdentity_11, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:203)
at io.mosip.testrig.apirig.esignet.testscripts.AddIdentity.test(AddIdentity.java:91)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_AddIdentity_Linked_Consent_Vid_smoke_Pos |
| Testcase Dependency |
| [] |
| Class Name |
| AddIdentity |
| Testcase Input |
| testCaseName=ESignet_AddIdentity_Linked_Consent_Vid_smoke_Pos, endPoint=/idrepository/v1/identity/, role=idrepo, templateFields=null, input={ "value": "$BIOVALUE$", "id": "mosip.id.create", "registrationId": "$RID$", "biometricReferenceId": "23452353", "UIN": "$UIN$", "dateOfBirth": "1992/04/15", "postalCode": "14022", "email": "ESignet_AddIdentity_Linked_Consent_Vid_smoke_Pos@mosip.net", "phone": "9876543210", "referenceIdentityNumber": "6789545678878", "version": "v1", "introducerRID": "212124324784879", "introducerUIN": "212124324784879", "category": "individualBiometrics", "requesttime": "$TIMESTAMP$" }, output={ "status":"ACTIVATED" }, inputTemplate=esignet/AddIdentity/addIdentity_$LANGNUMBER$, outputTemplate=esignet/AddIdentity/addIdentityResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Add identity linked consent Vid, uniqueIdentifier=Dependent_Idrepo_AddIdentity_12, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:203)
at io.mosip.testrig.apirig.esignet.testscripts.AddIdentity.test(AddIdentity.java:91)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_AddIdentity_Linked_Consent_smoke_Pos |
| Testcase Dependency |
| [] |
| Class Name |
| AddIdentity |
| Testcase Input |
| testCaseName=ESignet_AddIdentity_Linked_Consent_smoke_Pos, endPoint=/idrepository/v1/identity/, role=idrepo, templateFields=null, input={ "value": "$BIOVALUE$", "id": "mosip.id.create", "registrationId": "$RID$", "biometricReferenceId": "23452353", "UIN": "$UIN$", "dateOfBirth": "1992/04/15", "postalCode": "14022", "email": "ESignet_AddIdentity_Linked_Consent_smoke_Pos@mosip.net", "phone": "9876543210", "referenceIdentityNumber": "6789545678878", "version": "v1", "introducerRID": "212124324784879", "introducerUIN": "212124324784879", "category": "individualBiometrics", "requesttime": "$TIMESTAMP$" }, output={ "status":"ACTIVATED" }, inputTemplate=esignet/AddIdentity/addIdentity_$LANGNUMBER$, outputTemplate=esignet/AddIdentity/addIdentityResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Add identity linked consent, uniqueIdentifier=Dependent_Idrepo_AddIdentity_10, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:203)
at io.mosip.testrig.apirig.esignet.testscripts.AddIdentity.test(AddIdentity.java:91)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_AddIdentity_Linked_Sce_smoke_Pos |
| Testcase Dependency |
| [] |
| Class Name |
| AddIdentity |
| Testcase Input |
| testCaseName=ESignet_AddIdentity_Linked_Sce_smoke_Pos, endPoint=/idrepository/v1/identity/, role=idrepo, templateFields=null, input={ "value": "$BIOVALUE$", "id": "mosip.id.create", "registrationId": "$RID$", "biometricReferenceId": "23452353", "UIN": "$UIN$", "dateOfBirth": "1992/04/15", "postalCode": "14022", "email": "ESignet_AddIdentity_Linked_Sce_smoke_Pos@mosip.net", "phone": "9876543210", "referenceIdentityNumber": "6789545678878", "version": "v1", "introducerRID": "212124324784879", "introducerUIN": "212124324784879", "category": "individualBiometrics", "requesttime": "$TIMESTAMP$" }, output={ "status":"ACTIVATED" }, inputTemplate=esignet/AddIdentity/addIdentity_$LANGNUMBER$, outputTemplate=esignet/AddIdentity/addIdentityResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Add identity with valid parameters, uniqueIdentifier=Dependent_Idrepo_AddIdentity_09, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:203)
at io.mosip.testrig.apirig.esignet.testscripts.AddIdentity.test(AddIdentity.java:91)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_AddIdentity_Password_Auth_smoke_Pos |
| Testcase Dependency |
| [] |
| Class Name |
| AddIdentity |
| Testcase Input |
| testCaseName=ESignet_AddIdentity_Password_Auth_smoke_Pos, endPoint=/idrepository/v1/identity/, role=idrepo, templateFields=null, input={ "value": "$BIOVALUE$", "id": "mosip.id.create", "registrationId": "$RID$", "biometricReferenceId": "23452353", "UIN": "$UIN$", "dateOfBirth": "1992/04/15", "postalCode": "14022", "email": "ESignet_AddIdentity_Password_Auth_smoke_Pos@mosip.net", "phone": "9876543210", "referenceIdentityNumber": "6789545678878", "version": "v1", "introducerRID": "212124324784879", "introducerUIN": "212124324784879", "category": "individualBiometrics", "requesttime": "$TIMESTAMP$" }, output={ "status":"ACTIVATED" }, inputTemplate=esignet/AddIdentity/addIdentity_$LANGNUMBER$, outputTemplate=esignet/AddIdentity/addIdentityResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Add identity with password authentication, uniqueIdentifier=Dependent_Idrepo_AddIdentity_22, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:203)
at io.mosip.testrig.apirig.esignet.testscripts.AddIdentity.test(AddIdentity.java:91)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_AddIdentity_Valid_Parameters_Sce2_smoke_Pos |
| Testcase Dependency |
| [] |
| Class Name |
| AddIdentity |
| Testcase Input |
| testCaseName=ESignet_AddIdentity_Valid_Parameters_Sce2_smoke_Pos, endPoint=/idrepository/v1/identity/, role=idrepo, templateFields=null, input={ "value": "$BIOVALUE$", "id": "mosip.id.create", "registrationId": "$RID$", "biometricReferenceId": "23452353", "UIN": "$UIN$", "dateOfBirth": "1992/04/15", "postalCode": "14022", "email": "ESignet_AddIdentity_Valid_Parameters_Sce2_smoke_Pos@mosip.net", "phone": "9876543210", "referenceIdentityNumber": "6789545678878", "version": "v1", "introducerRID": "212124324784879", "introducerUIN": "212124324784879", "category": "individualBiometrics", "requesttime": "$TIMESTAMP$" }, output={ "status":"ACTIVATED" }, inputTemplate=esignet/AddIdentity/addIdentity_$LANGNUMBER$, outputTemplate=esignet/AddIdentity/addIdentityResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Add identity with all valid parameters, uniqueIdentifier=Dependent_Idrepo_AddIdentity_02, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:203)
at io.mosip.testrig.apirig.esignet.testscripts.AddIdentity.test(AddIdentity.java:91)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_AddIdentity_Valid_Parameters_smoke_Pos |
| Testcase Dependency |
| [] |
| Class Name |
| AddIdentity |
| Testcase Input |
| testCaseName=ESignet_AddIdentity_Valid_Parameters_smoke_Pos, endPoint=/idrepository/v1/identity/, role=idrepo, templateFields=null, input={ "value": "$BIOVALUE$", "id": "mosip.id.create", "registrationId": "$RID$", "biometricReferenceId": "23452353", "UIN": "$UIN$", "dateOfBirth": "1992/04/15", "postalCode": "14022", "email": "ESignet_AddIdentity_Valid_Parameters_smoke_Pos@mosip.net", "phone": "9876543210", "referenceIdentityNumber": "6789545678878", "version": "v1", "introducerRID": "212124324784879", "introducerUIN": "212124324784879", "category": "individualBiometrics", "requesttime": "$TIMESTAMP$" }, output={ "status":"ACTIVATED" }, inputTemplate=esignet/AddIdentity/addIdentity_$LANGNUMBER$, outputTemplate=esignet/AddIdentity/addIdentityResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Add identity with all valid parameters, uniqueIdentifier=Dependent_Idrepo_AddIdentity_01, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:203)
at io.mosip.testrig.apirig.esignet.testscripts.AddIdentity.test(AddIdentity.java:91)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_AddIdentity_Valid_Params_BindOtp_smoke_Pos |
| Testcase Dependency |
| [] |
| Class Name |
| AddIdentity |
| Testcase Input |
| testCaseName=ESignet_AddIdentity_Valid_Params_BindOtp_smoke_Pos, endPoint=/idrepository/v1/identity/, role=idrepo, templateFields=null, input={ "value": "$BIOVALUE$", "id": "mosip.id.create", "registrationId": "$RID$", "biometricReferenceId": "23452353", "UIN": "$UIN$", "dateOfBirth": "1992/04/15", "postalCode": "14022", "email": "ESignet_AddIdentity_Valid_Params_BindOtp_smoke_Pos@mosip.net", "phone": "9876543210", "referenceIdentityNumber": "6789545678878", "version": "v1", "introducerRID": "212124324784879", "introducerUIN": "212124324784879", "category": "individualBiometrics", "requesttime": "$TIMESTAMP$" }, output={ "status":"ACTIVATED" }, inputTemplate=esignet/AddIdentity/addIdentity_$LANGNUMBER$, outputTemplate=esignet/AddIdentity/addIdentityResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Add identity with all valid parameters, uniqueIdentifier=Dependent_Idrepo_AddIdentity_04, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:203)
at io.mosip.testrig.apirig.esignet.testscripts.AddIdentity.test(AddIdentity.java:91)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_AddIdentity_Valid_Params_VCI_Vid_Inv_Scen_smoke_Pos |
| Testcase Dependency |
| [] |
| Class Name |
| AddIdentity |
| Testcase Input |
| testCaseName=ESignet_AddIdentity_Valid_Params_VCI_Vid_Inv_Scen_smoke_Pos, endPoint=/idrepository/v1/identity/, role=idrepo, templateFields=null, input={ "value": "$BIOVALUE$", "id": "mosip.id.create", "registrationId": "$RID$", "biometricReferenceId": "23452353", "UIN": "$UIN$", "dateOfBirth": "1992/04/15", "postalCode": "14022", "email": "ESignet_AddIdentity_Valid_Params_VCI_Vid_Inv_Scen_smoke_Pos@mosip.net", "phone": "9876543210", "referenceIdentityNumber": "6789545678878", "version": "v1", "introducerRID": "212124324784879", "introducerUIN": "212124324784879", "category": "individualBiometrics", "requesttime": "$TIMESTAMP$" }, output={ "status":"ACTIVATED" }, inputTemplate=esignet/AddIdentity/addIdentity_$LANGNUMBER$, outputTemplate=esignet/AddIdentity/addIdentityResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Add identity with valid parameters VCI Vid invalid scenario, uniqueIdentifier=Dependent_Idrepo_AddIdentity_21, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:203)
at io.mosip.testrig.apirig.esignet.testscripts.AddIdentity.test(AddIdentity.java:91)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_AddIdentity_Valid_Params_VCI_Vid_smoke_Pos |
| Testcase Dependency |
| [] |
| Class Name |
| AddIdentity |
| Testcase Input |
| testCaseName=ESignet_AddIdentity_Valid_Params_VCI_Vid_smoke_Pos, endPoint=/idrepository/v1/identity/, role=idrepo, templateFields=null, input={ "value": "$BIOVALUE$", "id": "mosip.id.create", "registrationId": "$RID$", "biometricReferenceId": "23452353", "UIN": "$UIN$", "dateOfBirth": "1992/04/15", "postalCode": "14022", "email": "ESignet_AddIdentity_Valid_Params_VCI_Vid_smoke_Pos@mosip.net", "phone": "9876543210", "referenceIdentityNumber": "6789545678878", "version": "v1", "introducerRID": "212124324784879", "introducerUIN": "212124324784879", "category": "individualBiometrics", "requesttime": "$TIMESTAMP$" }, output={ "status":"ACTIVATED" }, inputTemplate=esignet/AddIdentity/addIdentity_$LANGNUMBER$, outputTemplate=esignet/AddIdentity/addIdentityResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Add identity with valid parameters VCI Vid, uniqueIdentifier=Dependent_Idrepo_AddIdentity_20, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:203)
at io.mosip.testrig.apirig.esignet.testscripts.AddIdentity.test(AddIdentity.java:91)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_AddIdentity_Valid_Params_VCI_uin_Inv_Scen_smoke_Pos |
| Testcase Dependency |
| [] |
| Class Name |
| AddIdentity |
| Testcase Input |
| testCaseName=ESignet_AddIdentity_Valid_Params_VCI_uin_Inv_Scen_smoke_Pos, endPoint=/idrepository/v1/identity/, role=idrepo, templateFields=null, input={ "value": "$BIOVALUE$", "id": "mosip.id.create", "registrationId": "$RID$", "biometricReferenceId": "23452353", "UIN": "$UIN$", "dateOfBirth": "1992/04/15", "postalCode": "14022", "email": "ESignet_AddIdentity_Valid_Params_VCI_uin_smoke_Pos@mosip.net", "phone": "9876543210", "referenceIdentityNumber": "6789545678878", "version": "v1", "introducerRID": "212124324784879", "introducerUIN": "212124324784879", "category": "individualBiometrics", "requesttime": "$TIMESTAMP$" }, output={ "status":"ACTIVATED" }, inputTemplate=esignet/AddIdentity/addIdentity_$LANGNUMBER$, outputTemplate=esignet/AddIdentity/addIdentityResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Add identity with valid parameters VCI UIN invalid scenario, uniqueIdentifier=Dependent_Idrepo_AddIdentity_19, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:203)
at io.mosip.testrig.apirig.esignet.testscripts.AddIdentity.test(AddIdentity.java:91)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_AddIdentity_Valid_Params_VCI_uin_smoke_Pos |
| Testcase Dependency |
| [] |
| Class Name |
| AddIdentity |
| Testcase Input |
| testCaseName=ESignet_AddIdentity_Valid_Params_VCI_uin_smoke_Pos, endPoint=/idrepository/v1/identity/, role=idrepo, templateFields=null, input={ "value": "$BIOVALUE$", "id": "mosip.id.create", "registrationId": "$RID$", "biometricReferenceId": "23452353", "UIN": "$UIN$", "dateOfBirth": "1992/04/15", "postalCode": "14022", "email": "ESignet_AddIdentity_Valid_Params_VCI_uin_smoke_Pos@mosip.net", "phone": "9876543210", "referenceIdentityNumber": "6789545678878", "version": "v1", "introducerRID": "212124324784879", "introducerUIN": "212124324784879", "category": "individualBiometrics", "requesttime": "$TIMESTAMP$" }, output={ "status":"ACTIVATED" }, inputTemplate=esignet/AddIdentity/addIdentity_$LANGNUMBER$, outputTemplate=esignet/AddIdentity/addIdentityResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Add identity with valid parameters VCI UIN, uniqueIdentifier=Dependent_Idrepo_AddIdentity_18, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:203)
at io.mosip.testrig.apirig.esignet.testscripts.AddIdentity.test(AddIdentity.java:91)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_AddIdentity_Valid_Params_WOEmail_smoke_Pos |
| Testcase Dependency |
| [] |
| Class Name |
| AddIdentity |
| Testcase Input |
| testCaseName=ESignet_AddIdentity_Valid_Params_WOEmail_smoke_Pos, endPoint=/idrepository/v1/identity/, role=idrepo, templateFields=null, input={ "value": "$BIOVALUE$", "id": "mosip.id.create", "registrationId": "$RID$", "biometricReferenceId": "23452353", "UIN": "$UIN$", "dateOfBirth": "1992/04/15", "postalCode": "14022", "phone": "9876543210", "email": "$REMOVE$", "referenceIdentityNumber": "6789545678878", "version": "v1", "introducerRID": "212124324784879", "introducerUIN": "212124324784879", "category": "individualBiometrics", "requesttime": "$TIMESTAMP$" }, output={ "status":"ACTIVATED" }, inputTemplate=esignet/AddIdentity/addIdentity_$LANGNUMBER$, outputTemplate=esignet/AddIdentity/addIdentityResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Add identity with valid parameter and without Email, uniqueIdentifier=Dependent_Idrepo_AddIdentity_06, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:203)
at io.mosip.testrig.apirig.esignet.testscripts.AddIdentity.test(AddIdentity.java:91)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_AddIdentity_Valid_Params_WOPhone_smoke_Pos |
| Testcase Dependency |
| [] |
| Class Name |
| AddIdentity |
| Testcase Input |
| testCaseName=ESignet_AddIdentity_Valid_Params_WOPhone_smoke_Pos, endPoint=/idrepository/v1/identity/, role=idrepo, templateFields=null, input={ "value": "$BIOVALUE$", "id": "mosip.id.create", "registrationId": "$RID$", "biometricReferenceId": "23452353", "UIN": "$UIN$", "dateOfBirth": "1992/04/15", "postalCode": "14022", "phone": "$REMOVE$", "email": "ESignet_AddIdentity_Valid_Params_WOPhone_smoke_Pos@mosip.net", "referenceIdentityNumber": "6789545678878", "version": "v1", "introducerRID": "212124324784879", "introducerUIN": "212124324784879", "category": "individualBiometrics", "requesttime": "$TIMESTAMP$" }, output={ "status":"ACTIVATED" }, inputTemplate=esignet/AddIdentity/addIdentity_$LANGNUMBER$, outputTemplate=esignet/AddIdentity/addIdentityResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Add identity with valid parameter and without phone number, uniqueIdentifier=Dependent_Idrepo_AddIdentity_05, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:203)
at io.mosip.testrig.apirig.esignet.testscripts.AddIdentity.test(AddIdentity.java:91)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_AddIdentity_Vid_2_Generation_smoke_Pos |
| Testcase Dependency |
| [] |
| Class Name |
| AddIdentity |
| Testcase Input |
| testCaseName=ESignet_AddIdentity_Vid_2_Generation_smoke_Pos, endPoint=/idrepository/v1/identity/, role=idrepo, templateFields=null, input={ "value": "$BIOVALUE$", "id": "mosip.id.create", "registrationId": "$RID$", "biometricReferenceId": "23452353", "UIN": "$UIN$", "dateOfBirth": "1992/04/15", "postalCode": "14022", "email": "ESignet_AddIdentity_Vid_2_Generation_smoke_Pos@mosip.net", "phone": "9876543210", "referenceIdentityNumber": "6789545678878", "version": "v1", "introducerRID": "212124324784879", "introducerUIN": "212124324784879", "category": "individualBiometrics", "requesttime": "$TIMESTAMP$" }, output={ "status":"ACTIVATED" }, inputTemplate=esignet/AddIdentity/addIdentity_$LANGNUMBER$, outputTemplate=esignet/AddIdentity/addIdentityResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Add identity Vid generation, uniqueIdentifier=Dependent_Idrepo_AddIdentity_08, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:203)
at io.mosip.testrig.apirig.esignet.testscripts.AddIdentity.test(AddIdentity.java:91)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_AddIdentity_Vid_Generation_smoke_Pos |
| Testcase Dependency |
| [] |
| Class Name |
| AddIdentity |
| Testcase Input |
| testCaseName=ESignet_AddIdentity_Vid_Generation_smoke_Pos, endPoint=/idrepository/v1/identity/, role=idrepo, templateFields=null, input={ "value": "$BIOVALUE$", "id": "mosip.id.create", "registrationId": "$RID$", "biometricReferenceId": "23452353", "UIN": "$UIN$", "dateOfBirth": "1992/04/15", "postalCode": "14022", "email": "ESignet_AddIdentity_Vid_Generation_smoke_Pos@mosip.net", "phone": "9876543210", "referenceIdentityNumber": "6789545678878", "version": "v1", "introducerRID": "212124324784879", "introducerUIN": "212124324784879", "category": "individualBiometrics", "requesttime": "$TIMESTAMP$" }, output={ "status":"ACTIVATED" }, inputTemplate=esignet/AddIdentity/addIdentity_$LANGNUMBER$, outputTemplate=esignet/AddIdentity/addIdentityResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Add identity Vid generation, uniqueIdentifier=Dependent_Idrepo_AddIdentity_07, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:203)
at io.mosip.testrig.apirig.esignet.testscripts.AddIdentity.test(AddIdentity.java:91)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| Esignet_DefinePolicyGroup_All_Valid_Smoke_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Esignet_DefinePolicyGroup_All_Valid_Smoke_sid, endPoint=/v1/policymanager/policies/group/new, role=partner, templateFields=null, input={ "desc": "$POLICYGROUPDESC$", "name": "$POLICYGROUPNAME$", "requesttime": "$TIMESTAMP$" }, output= { "is_Active": true }, inputTemplate=esignet/PmsIntegration/DefinePolicyGroup/definePolicyGroup, outputTemplate=esignet/PmsIntegration/DefinePolicyGroup/definePolicyGroupResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Define policy group with all valid parameters, uniqueIdentifier=Dependent_Idrepo_definePolicyGroup_01, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:203)
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:93)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| Esignet_DefinePolicyGroup_Misp_Valid_Smoke_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Esignet_DefinePolicyGroup_Misp_Valid_Smoke_sid, endPoint=/v1/policymanager/policies/group/new, role=partner, templateFields=null, input={ "desc": "$MISPPOLICYGROUPDESC$", "name": "$MISPPOLICYGROUPNAME$", "requesttime": "$TIMESTAMP$" }, output= { "is_Active": true }, inputTemplate=esignet/PmsIntegration/DefinePolicyGroup/definePolicyGroup, outputTemplate=esignet/PmsIntegration/DefinePolicyGroup/definePolicyGroupResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Define policy group with valid Misp, uniqueIdentifier=Dependent_Idrepo_definePolicyGroup_02, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:203)
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:93)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| Esignet_DefinePolicyGroup_Valid_Smoke_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Esignet_DefinePolicyGroup_Valid_Smoke_sid, endPoint=/v1/policymanager/policies/group/new, role=partner, templateFields=null, input={ "desc": "$RIDDEL$", "name": "$RIDDEL$", "requesttime": "$TIMESTAMP$" }, output= { "is_Active": true }, inputTemplate=esignet/PmsIntegration/DefinePolicyGroup/definePolicyGroup, outputTemplate=esignet/PmsIntegration/DefinePolicyGroup/definePolicyGroupResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Define policy group with valid details, uniqueIdentifier=Dependent_Idrepo_definePolicyGroup_04, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:203)
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:93)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| Esignet_DefinePolicyGroup_in_Valid_Smoke_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Esignet_DefinePolicyGroup_in_Valid_Smoke_sid, endPoint=/v1/policymanager/policies/group/new, role=partner, templateFields=null, input={ "desc": "$RID$", "name": "$RID$", "requesttime": "$TIMESTAMP$" }, output= { "is_Active": true }, inputTemplate=esignet/PmsIntegration/DefinePolicyGroup/definePolicyGroup, outputTemplate=esignet/PmsIntegration/DefinePolicyGroup/definePolicyGroupResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Define policy group with valid details, uniqueIdentifier=Dependent_Idrepo_definePolicyGroup_03, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:203)
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:93)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| Esignet_DefinePolicy_All_Valid_Smoke_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Esignet_DefinePolicy_All_Valid_Smoke_sid, endPoint=/v1/policymanager/policies, role=partner, templateFields=null, input={ "desc": "$POLICYDESC$", "name": "$POLICYNAME$", "policyGroupName": "$ID:DefinePolicyGroup_All_Valid_Smoke_sid_name$", "policyType": "Auth", "version": "1.0", "requesttime": "$TIMESTAMP$" }, output= { "is_Active": false }, inputTemplate=esignet/PmsIntegration/DefinePolicy/definePolicy, outputTemplate=esignet/PmsIntegration/DefinePolicy/definePolicyResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Define policy with all valid details, uniqueIdentifier=Dependent_Idrepo_definePolicy_01, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:203)
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:93)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| Esignet_DefinePolicy_Auth_False_Valid_Smoke_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Esignet_DefinePolicy_Auth_False_Valid_Smoke_sid, endPoint=/v1/policymanager/policies, role=partner, templateFields=null, input={ "desc": "$POLICYDESC1$", "name": "$RANDOMPOLICYNAME$", "policyGroupName": "$ID:DefinePolicyGroup_Misp_Valid_Smoke_sid_name$", "policyType": "Auth", "version": "1.0", "requesttime": "$TIMESTAMP$" }, output= { "is_Active": false }, inputTemplate=esignet/PmsIntegration/DefinePolicy/definePolicyWOPhone, outputTemplate=esignet/PmsIntegration/DefinePolicy/definePolicyResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Define policy with Auth and isActive as false, uniqueIdentifier=Dependent_Idrepo_definePolicy_13, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:203)
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:93)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| Esignet_DefinePolicy_Auth_S2_Valid_Smoke_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Esignet_DefinePolicy_Auth_S2_Valid_Smoke_sid, endPoint=/v1/policymanager/policies, role=partner, templateFields=null, input={ "desc": "$POLICYDESC1$", "name": "$RANDOMPOLICYNAME$", "policyGroupName": "$ID:DefinePolicyGroup_Misp_Valid_Smoke_sid_name$", "policyType": "Auth", "version": "1.0", "requesttime": "$TIMESTAMP$" }, output= { "is_Active": false }, inputTemplate=esignet/PmsIntegration/DefinePolicy/definePolicy, outputTemplate=esignet/PmsIntegration/DefinePolicy/definePolicyResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Define policy with Auth S2, uniqueIdentifier=Dependent_Idrepo_definePolicy_15, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:203)
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:93)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| Esignet_DefinePolicy_Auth_Valid_Smoke_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Esignet_DefinePolicy_Auth_Valid_Smoke_sid, endPoint=/v1/policymanager/policies, role=partner, templateFields=null, input={ "desc": "$POLICYDESC1$", "name": "$POLICYNAME1$", "policyGroupName": "$ID:DefinePolicyGroup_Misp_Valid_Smoke_sid_name$", "policyType": "Auth", "version": "1.0", "requesttime": "$TIMESTAMP$" }, output= { "is_Active": false }, inputTemplate=esignet/PmsIntegration/DefinePolicy/definePolicy, outputTemplate=esignet/PmsIntegration/DefinePolicy/definePolicyResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Define policy with Auth, uniqueIdentifier=Dependent_Idrepo_definePolicy_03, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:203)
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:93)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| Esignet_DefinePolicy_Invalid_MispPolicy_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Esignet_DefinePolicy_Invalid_MispPolicy_Neg, endPoint=/v1/policymanager/policies, role=partner, templateFields=null, input={ "desc": "$MISPPOLICYDESC$", "name": "$RANDOMPOLICYNAME$", "policyGroupName": "$ID:DefinePolicyGroup_Misp_Valid_Smoke_sid_name$", "policyType": "MISP", "version": "1.0", "requesttime": "$TIMESTAMP$" }, output= { "is_Active": false }, inputTemplate=esignet/PmsIntegration/DefinePolicy/definePolicyInvalid2, outputTemplate=esignet/PmsIntegration/DefinePolicy/definePolicyResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Define policy with invalid MispPolicy, uniqueIdentifier=Dependent_Idrepo_definePolicy_10, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:203)
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:93)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| Esignet_DefinePolicy_Invalid_PolicyAuth_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Esignet_DefinePolicy_Invalid_PolicyAuth_Neg, endPoint=/v1/policymanager/policies, role=partner, templateFields=null, input={ "desc": "$MISPPOLICYDESC$", "name": "$RANDOMPOLICYNAME$", "policyGroupName": "$ID:DefinePolicyGroup_Misp_Valid_Smoke_sid_name$", "policyType": "MISP", "version": "1.0", "requesttime": "$TIMESTAMP$" }, output= { "is_Active": false }, inputTemplate=esignet/PmsIntegration/DefinePolicy/definePolicyInvalid, outputTemplate=esignet/PmsIntegration/DefinePolicy/definePolicyResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Define policy with invalid policyAuth, uniqueIdentifier=Dependent_Idrepo_definePolicy_09, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:203)
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:93)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| Esignet_DefinePolicy_Invalid_PolicyGroupName_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Esignet_DefinePolicy_Invalid_PolicyGroupName_Neg, endPoint=/v1/policymanager/policies, role=partner, templateFields=null, input={ "desc": "$MISPPOLICYDESC$", "name": "$MISPPOLICYNAME$", "policyGroupName": "sdnvfsjf", "policyType": "MISP", "version": "1.0", "requesttime": "$TIMESTAMP$" }, output= { "errors": [ { "errorCode": "PMS_POL_019" } ] }, inputTemplate=esignet/PmsIntegration/DefinePolicy/definePolicyMisp, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Define policy with invalid policyGroupName, uniqueIdentifier=Dependent_Idrepo_definePolicy_08, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:203)
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:93)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| Esignet_DefinePolicy_Invalid_PolicyType_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Esignet_DefinePolicy_Invalid_PolicyType_Neg, endPoint=/v1/policymanager/policies, role=partner, templateFields=null, input={ "desc": "$MISPPOLICYDESC$", "name": "$MISPPOLICYNAME$", "policyGroupName": "$ID:DefinePolicyGroup_Misp_Valid_Smoke_sid_name$", "policyType": "shdb", "version": "1.0", "requesttime": "$TIMESTAMP$" }, output= { "errors": [ { "errorCode": "PMS_POL_023" } ] }, inputTemplate=esignet/PmsIntegration/DefinePolicy/definePolicyMisp, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Define policy with invalid policyType, uniqueIdentifier=Dependent_Idrepo_definePolicy_07, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:203)
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:93)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| Esignet_DefinePolicy_Misp_False_Valid_Smoke_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Esignet_DefinePolicy_Misp_False_Valid_Smoke_sid, endPoint=/v1/policymanager/policies, role=partner, templateFields=null, input={ "desc": "$MISPPOLICYDESC$", "name": "$RANDOMPOLICYNAME$", "policyGroupName": "$ID:DefinePolicyGroup_Misp_Valid_Smoke_sid_name$", "policyType": "MISP", "version": "1.0", "requesttime": "$TIMESTAMP$" }, output= { "is_Active": false }, inputTemplate=esignet/PmsIntegration/DefinePolicy/definePolicyMispFalse, outputTemplate=esignet/PmsIntegration/DefinePolicy/definePolicyResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Define policy with isActive as false, uniqueIdentifier=Dependent_Idrepo_definePolicy_12, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:203)
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:93)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| Esignet_DefinePolicy_Misp_S2_Valid_Smoke_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Esignet_DefinePolicy_Misp_S2_Valid_Smoke_sid, endPoint=/v1/policymanager/policies, role=partner, templateFields=null, input={ "desc": "$MISPPOLICYDESC$", "name": "$RANDOMPOLICYNAME$", "policyGroupName": "$ID:DefinePolicyGroup_Misp_Valid_Smoke_sid_name$", "policyType": "MISP", "version": "1.0", "requesttime": "$TIMESTAMP$" }, output= { "is_Active": false }, inputTemplate=esignet/PmsIntegration/DefinePolicy/definePolicyMisp, outputTemplate=esignet/PmsIntegration/DefinePolicy/definePolicyResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Define policy with Misp S2, uniqueIdentifier=Dependent_Idrepo_definePolicy_14, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:203)
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:93)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| Esignet_DefinePolicy_Misp_Valid_Smoke_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Esignet_DefinePolicy_Misp_Valid_Smoke_sid, endPoint=/v1/policymanager/policies, role=partner, templateFields=null, input={ "desc": "$MISPPOLICYDESC$", "name": "$MISPPOLICYNAME$", "policyGroupName": "$ID:DefinePolicyGroup_Misp_Valid_Smoke_sid_name$", "policyType": "MISP", "version": "1.0", "requesttime": "$TIMESTAMP$" }, output= { "is_Active": false }, inputTemplate=esignet/PmsIntegration/DefinePolicy/definePolicyMisp, outputTemplate=esignet/PmsIntegration/DefinePolicy/definePolicyResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Define policy with all valid details Misp, uniqueIdentifier=Dependent_Idrepo_definePolicy_02, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:203)
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:93)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| Esignet_DefinePolicy_NonAuth_All_Valid_Smoke_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Esignet_DefinePolicy_NonAuth_All_Valid_Smoke_sid, endPoint=/v1/policymanager/policies, role=partner, templateFields=null, input={ "desc": "$POLICYDESC$", "name": "$POLICYNAMENONAUTH$", "policyGroupName": "$ID:DefinePolicyGroup_All_Valid_Smoke_sid_name$", "policyType": "Auth", "version": "1.0", "requesttime": "$TIMESTAMP$" }, output= { "is_Active": false }, inputTemplate=esignet/PmsIntegration/DefinePolicy/definePolicyNonAuth, outputTemplate=esignet/PmsIntegration/DefinePolicy/definePolicyResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Define policy with NonAuth, uniqueIdentifier=Dependent_Idrepo_definePolicy_04, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:203)
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:93)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| Esignet_DefinePolicy_With_1_Policy_All_Valid_Smoke_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Esignet_DefinePolicy_With_1_Policy_All_Valid_Smoke_sid, endPoint=/v1/policymanager/policies, role=partner, templateFields=null, input={ "desc": "$POLICYDESC$", "name": "$RANDOMPOLICYNAME$", "policyGroupName": "$ID:DefinePolicyGroup_Misp_Valid_Smoke_sid_name$", "policyType": "MISP", "version": "1.0", "requesttime": "$TIMESTAMP$" }, output= { "errors": [ { "errorCode": "PMS_PV_006" } ] }, inputTemplate=esignet/PmsIntegration/DefinePolicy/definePolicyMisp1, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Define policy with 1 policy valid details, uniqueIdentifier=Dependent_Idrepo_definePolicy_05, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:203)
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:93)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| Esignet_DefinePolicy_With_2_Policy_All_Valid_Smoke_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Esignet_DefinePolicy_With_2_Policy_All_Valid_Smoke_sid, endPoint=/v1/policymanager/policies, role=partner, templateFields=null, input={ "desc": "$POLICYDESC$", "name": "$RANDOMPOLICYNAME$", "policyGroupName": "$ID:DefinePolicyGroup_Misp_Valid_Smoke_sid_name$", "policyType": "MISP", "version": "1.0", "requesttime": "$TIMESTAMP$" }, output= { "errors": [ { "errorCode": "PMS_PV_006" } ] }, inputTemplate=esignet/PmsIntegration/DefinePolicy/definePolicyMisp2, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Define policy with 2 policy valid details, uniqueIdentifier=Dependent_Idrepo_definePolicy_06, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:203)
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:93)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| Esignet_DefinePolicy__Invalid_Misp_Name_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Esignet_DefinePolicy__Invalid_Misp_Name_Neg, endPoint=/v1/policymanager/policies, role=partner, templateFields=null, input={ "desc": "$MISPPOLICYDESC$", "name": "$MISPPOLICYNAME$", "policyGroupName": "$ID:DefinePolicyGroup_Misp_Valid_Smoke_sid_name$", "policyType": "MISP", "version": "1.0", "requesttime": "$TIMESTAMP$" }, output= { "errors": [ { "errorCode": "PMS_POL_009" } ] }, inputTemplate=esignet/PmsIntegration/DefinePolicy/definePolicyMisp, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Define policy with invalid Misp Name, uniqueIdentifier=Dependent_Idrepo_definePolicy_11, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:203)
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:93)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| Esignet_PublishPolicy_All_Valid_Smoke |
| Testcase Dependency |
| [] |
| Class Name |
| PostWithOnlyPathParam |
| Testcase Input |
| testCaseName=Esignet_PublishPolicy_All_Valid_Smoke, endPoint=/v1/policymanager/policies/{policyId}/group/{policygroupId}/publish, role=partner, templateFields=null, input={ "policygroupId": "$ID:DefinePolicyGroup_All_Valid_Smoke_sid_id$", "policyId": "$ID:DefinePolicy_All_Valid_Smoke_sid_id$", "requesttime": "$TIMESTAMP$" }, output={ "policyGroupStatus": "true", "policyType": "Auth", "status": "PUBLISHED", "is_Active": "true", "authType": "bio" }, inputTemplate=esignet/PmsIntegration/PublishPolicy/publishPolicy, outputTemplate=esignet/PmsIntegration/PublishPolicy/publishPolicyResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Publish policy with all valid details, uniqueIdentifier=Dependent_Idrepo_createPublishPolicy_01, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:203)
at io.mosip.testrig.apirig.esignet.testscripts.PostWithOnlyPathParam.test(PostWithOnlyPathParam.java:86)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| Esignet_PublishPolicy_Auth_False_Valid_Smoke |
| Testcase Dependency |
| [] |
| Class Name |
| PostWithOnlyPathParam |
| Testcase Input |
| testCaseName=Esignet_PublishPolicy_Auth_False_Valid_Smoke, endPoint=/v1/policymanager/policies/{policyId}/group/{policygroupId}/publish, role=partner, templateFields=null, input={ "policygroupId": "$ID:DefinePolicyGroup_Misp_Valid_Smoke_sid_id$", "policyId": "$ID:DefinePolicy_Auth_False_Valid_Smoke_sid_id$", "requesttime": "$TIMESTAMP$" }, output={ "policyGroupStatus": "true", "policyType": "Auth", "status": "PUBLISHED", "is_Active": "true", "authType": "bio" }, inputTemplate=esignet/PmsIntegration/PublishPolicy/publishPolicy, outputTemplate=esignet/PmsIntegration/PublishPolicy/publishPolicyResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Publish policy Auth false valid details, uniqueIdentifier=Dependent_Idrepo_createPublishPolicy_06, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:203)
at io.mosip.testrig.apirig.esignet.testscripts.PostWithOnlyPathParam.test(PostWithOnlyPathParam.java:86)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| Esignet_PublishPolicy_Auth_S2_Valid_Smoke |
| Testcase Dependency |
| [] |
| Class Name |
| PostWithOnlyPathParam |
| Testcase Input |
| testCaseName=Esignet_PublishPolicy_Auth_S2_Valid_Smoke, endPoint=/v1/policymanager/policies/{policyId}/group/{policygroupId}/publish, role=partner, templateFields=null, input={ "policygroupId": "$ID:DefinePolicyGroup_Misp_Valid_Smoke_sid_id$", "policyId": "$ID:DefinePolicy_Auth_S2_Valid_Smoke_sid_id$", "requesttime": "$TIMESTAMP$" }, output={ "policyGroupStatus": "true", "policyType": "Auth", "status": "PUBLISHED", "is_Active": "true", "authType": "bio" }, inputTemplate=esignet/PmsIntegration/PublishPolicy/publishPolicy, outputTemplate=esignet/PmsIntegration/PublishPolicy/publishPolicyResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Publish policy Auth S2 valid details, uniqueIdentifier=Dependent_Idrepo_createPublishPolicy_08, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:203)
at io.mosip.testrig.apirig.esignet.testscripts.PostWithOnlyPathParam.test(PostWithOnlyPathParam.java:86)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| Esignet_PublishPolicy_Misp_False_Valid_Smoke |
| Testcase Dependency |
| [] |
| Class Name |
| PostWithOnlyPathParam |
| Testcase Input |
| testCaseName=Esignet_PublishPolicy_Misp_False_Valid_Smoke, endPoint=/v1/policymanager/policies/{policyId}/group/{policygroupId}/publish, role=partner, templateFields=null, input={ "policygroupId": "$ID:DefinePolicyGroup_Misp_Valid_Smoke_sid_id$", "policyId": "$ID:DefinePolicy_Misp_False_Valid_Smoke_sid_id$", "requesttime": "$TIMESTAMP$" }, output={ "policyGroupStatus": "true", "policyType": "MISP", "status": "PUBLISHED", "is_Active": "true" }, inputTemplate=esignet/PmsIntegration/PublishPolicy/publishPolicy, outputTemplate=esignet/PmsIntegration/PublishPolicy/publishPolicyMispResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Publish policy Misp false valid details, uniqueIdentifier=Dependent_Idrepo_createPublishPolicy_05, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:203)
at io.mosip.testrig.apirig.esignet.testscripts.PostWithOnlyPathParam.test(PostWithOnlyPathParam.java:86)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| Esignet_PublishPolicy_Misp_S2_Valid_Smoke |
| Testcase Dependency |
| [] |
| Class Name |
| PostWithOnlyPathParam |
| Testcase Input |
| testCaseName=Esignet_PublishPolicy_Misp_S2_Valid_Smoke, endPoint=/v1/policymanager/policies/{policyId}/group/{policygroupId}/publish, role=partner, templateFields=null, input={ "policygroupId": "$ID:DefinePolicyGroup_Misp_Valid_Smoke_sid_id$", "policyId": "$ID:DefinePolicy_Misp_S2_Valid_Smoke_sid_id$", "requesttime": "$TIMESTAMP$" }, output={ "policyGroupStatus": "true", "policyType": "MISP", "status": "PUBLISHED", "is_Active": "true" }, inputTemplate=esignet/PmsIntegration/PublishPolicy/publishPolicy, outputTemplate=esignet/PmsIntegration/PublishPolicy/publishPolicyMispResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Publish policy Misp S2 valid details, uniqueIdentifier=Dependent_Idrepo_createPublishPolicy_07, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:203)
at io.mosip.testrig.apirig.esignet.testscripts.PostWithOnlyPathParam.test(PostWithOnlyPathParam.java:86)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| Esignet_PublishPolicy_Misp_Valid_Smoke |
| Testcase Dependency |
| [] |
| Class Name |
| PostWithOnlyPathParam |
| Testcase Input |
| testCaseName=Esignet_PublishPolicy_Misp_Valid_Smoke, endPoint=/v1/policymanager/policies/{policyId}/group/{policygroupId}/publish, role=partner, templateFields=null, input={ "policygroupId": "$ID:DefinePolicyGroup_Misp_Valid_Smoke_sid_id$", "policyId": "$ID:DefinePolicy_Misp_Valid_Smoke_sid_id$", "requesttime": "$TIMESTAMP$" }, output={ "policyGroupStatus": "true", "policyType": "MISP", "status": "PUBLISHED", "is_Active": "true" }, inputTemplate=esignet/PmsIntegration/PublishPolicy/publishPolicy, outputTemplate=esignet/PmsIntegration/PublishPolicy/publishPolicyMispResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Publish policy Misp with all valid details, uniqueIdentifier=Dependent_Idrepo_createPublishPolicy_02, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:203)
at io.mosip.testrig.apirig.esignet.testscripts.PostWithOnlyPathParam.test(PostWithOnlyPathParam.java:86)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| Esignet_PublishPolicy_NonAuth_All_Valid_Smoke |
| Testcase Dependency |
| [] |
| Class Name |
| PostWithOnlyPathParam |
| Testcase Input |
| testCaseName=Esignet_PublishPolicy_NonAuth_All_Valid_Smoke, endPoint=/v1/policymanager/policies/{policyId}/group/{policygroupId}/publish, role=partner, templateFields=null, input={ "policygroupId": "$ID:DefinePolicyGroup_All_Valid_Smoke_sid_id$", "policyId": "$ID:DefinePolicy_NonAuth_All_Valid_Smoke_sid_id$", "requesttime": "$TIMESTAMP$" }, output={ "policyGroupStatus": "true", "policyType": "Auth", "status": "PUBLISHED", "is_Active": "true" }, inputTemplate=esignet/PmsIntegration/PublishPolicy/publishPolicy, outputTemplate=esignet/PmsIntegration/PublishPolicy/publishPolicyMispResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Publish policy with NonAuth valid details, uniqueIdentifier=Dependent_Idrepo_createPublishPolicy_04, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:203)
at io.mosip.testrig.apirig.esignet.testscripts.PostWithOnlyPathParam.test(PostWithOnlyPathParam.java:86)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| Esignet_PublishPolicy_Valid_Smoke |
| Testcase Dependency |
| [] |
| Class Name |
| PostWithOnlyPathParam |
| Testcase Input |
| testCaseName=Esignet_PublishPolicy_Valid_Smoke, endPoint=/v1/policymanager/policies/{policyId}/group/{policygroupId}/publish, role=partner, templateFields=null, input={ "policygroupId": "$ID:DefinePolicyGroup_Misp_Valid_Smoke_sid_id$", "policyId": "$ID:DefinePolicy_Auth_Valid_Smoke_sid_id$", "requesttime": "$TIMESTAMP$" }, output={ "policyGroupStatus": "true", "policyType": "Auth", "status": "PUBLISHED", "is_Active": "true", "authType": "bio" }, inputTemplate=esignet/PmsIntegration/PublishPolicy/publishPolicy, outputTemplate=esignet/PmsIntegration/PublishPolicy/publishPolicyResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Publish policy with valid details, uniqueIdentifier=Dependent_Idrepo_createPublishPolicy_03, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:203)
at io.mosip.testrig.apirig.esignet.testscripts.PostWithOnlyPathParam.test(PostWithOnlyPathParam.java:86)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| Esignet_PartnerSelfRegistration_All_Valid_Smoke_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Esignet_PartnerSelfRegistration_All_Valid_Smoke_sid, endPoint=/v1/partnermanager/partners, role=partner, templateFields=null, input={ "address": "Bangalore", "contactNumber": "8553967372", "emailId": "$PARTNEREMAIL$", "organizationName": "$PARTNERID$", "partnerId": "$PARTNERID$", "partnerType": "Auth_Partner", "policyGroup": "$ID:DefinePolicyGroup_All_Valid_Smoke_sid_name$", "requesttime": "$TIMESTAMP$" }, output= { "status": "InProgress" }, inputTemplate=esignet/PmsIntegration/CreatePartner/createPartner, outputTemplate=esignet/PmsIntegration/CreatePartner/createPartnerResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=PartnerSelfRegistration with all valid details, uniqueIdentifier=Dependent_Idrepo_createPartnerSelfRegistration_01, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:203)
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:93)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| Esignet_PartnerSelfRegistration_Auth_False_Valid_Smoke_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Esignet_PartnerSelfRegistration_Auth_False_Valid_Smoke_sid, endPoint=/v1/partnermanager/partners, role=partner, templateFields=null, input={ "address": "Bangalore", "contactNumber": "8553967372", "emailId": "$RANDOMPARTNEREMAIL$", "organizationName": "$RANDOMPARTNERID$", "partnerId": "$RANDOMPARTNERID$", "partnerType": "Auth_Partner", "policyGroup": "$ID:DefinePolicyGroup_Misp_Valid_Smoke_sid_name$", "requesttime": "$TIMESTAMP$" }, output= { "status": "InProgress" }, inputTemplate=esignet/PmsIntegration/CreatePartner/createPartner, outputTemplate=esignet/PmsIntegration/CreatePartner/createPartnerResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=PartnerSelfRegistration Auth false valid details, uniqueIdentifier=Dependent_Idrepo_createPartnerSelfRegistration_06, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:203)
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:93)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| Esignet_PartnerSelfRegistration_Auth_S2_Valid_Smoke_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Esignet_PartnerSelfRegistration_Auth_S2_Valid_Smoke_sid, endPoint=/v1/partnermanager/partners, role=partner, templateFields=null, input={ "address": "Bangalore", "contactNumber": "8553967372", "emailId": "$RANDOMPARTNEREMAIL$", "organizationName": "$RANDOMPARTNERID$", "partnerId": "$RANDOMPARTNERID$", "partnerType": "Auth_Partner", "policyGroup": "$ID:DefinePolicyGroup_Misp_Valid_Smoke_sid_name$", "requesttime": "$TIMESTAMP$" }, output= { "status": "InProgress" }, inputTemplate=esignet/PmsIntegration/CreatePartner/createPartner, outputTemplate=esignet/PmsIntegration/CreatePartner/createPartnerResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=PartnerSelfRegistration Auth S2 valid details, uniqueIdentifier=Dependent_Idrepo_createPartnerSelfRegistration_08, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:203)
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:93)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| Esignet_PartnerSelfRegistration_Kyc_Valid_Smoke_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Esignet_PartnerSelfRegistration_Kyc_Valid_Smoke_sid, endPoint=/v1/partnermanager/partners, role=partner, templateFields=null, input={ "address": "Bangalore", "contactNumber": "8553967372", "emailId": "$PARTNEREMAIL1$", "organizationName": "$PARTNERID1$", "partnerId": "$PARTNERID1$", "partnerType": "Auth_Partner", "policyGroup": "$ID:DefinePolicyGroup_Misp_Valid_Smoke_sid_name$", "requesttime": "$TIMESTAMP$" }, output= { "status": "InProgress" }, inputTemplate=esignet/PmsIntegration/CreatePartner/createPartner, outputTemplate=esignet/PmsIntegration/CreatePartner/createPartnerResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=PartnerSelfRegistration Kyc valid details, uniqueIdentifier=Dependent_Idrepo_createPartnerSelfRegistration_03, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:203)
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:93)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| Esignet_PartnerSelfRegistration_Misp_False_Valid_Smoke_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Esignet_PartnerSelfRegistration_Misp_False_Valid_Smoke_sid, endPoint=/v1/partnermanager/partners, role=partner, templateFields=null, input={ "address": "Bangalore", "contactNumber": "8553967372", "emailId": "$RANDOMPARTNEREMAIL$", "organizationName": "$RANDOMPARTNERID$", "partnerId": "$RANDOMPARTNERID$", "partnerType": "MISP_Partner", "policyGroup": "$ID:DefinePolicyGroup_Misp_Valid_Smoke_sid_name$", "requesttime": "$TIMESTAMP$" }, output= { "status": "InProgress" }, inputTemplate=esignet/PmsIntegration/CreatePartner/createPartner, outputTemplate=esignet/PmsIntegration/CreatePartner/createPartnerResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=PartnerSelfRegistration Misp false valid details, uniqueIdentifier=Dependent_Idrepo_createPartnerSelfRegistration_05, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:203)
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:93)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| Esignet_PartnerSelfRegistration_Misp_S2_Valid_Smoke_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Esignet_PartnerSelfRegistration_Misp_S2_Valid_Smoke_sid, endPoint=/v1/partnermanager/partners, role=partner, templateFields=null, input={ "address": "Bangalore", "contactNumber": "8553967372", "emailId": "$RANDOMPARTNEREMAIL$", "organizationName": "$RANDOMPARTNERID$", "partnerId": "$RANDOMPARTNERID$", "partnerType": "MISP_Partner", "policyGroup": "$ID:DefinePolicyGroup_Misp_Valid_Smoke_sid_name$", "requesttime": "$TIMESTAMP$" }, output= { "status": "InProgress" }, inputTemplate=esignet/PmsIntegration/CreatePartner/createPartner, outputTemplate=esignet/PmsIntegration/CreatePartner/createPartnerResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=PartnerSelfRegistration Misp S2 valid details, uniqueIdentifier=Dependent_Idrepo_createPartnerSelfRegistration_07, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:203)
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:93)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| Esignet_PartnerSelfRegistration_Misp_Valid_Smoke_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Esignet_PartnerSelfRegistration_Misp_Valid_Smoke_sid, endPoint=/v1/partnermanager/partners, role=partner, templateFields=null, input={ "address": "Bangalore", "contactNumber": "8553967372", "emailId": "$MISPPARTNEREMAIL$", "organizationName": "$MISPPARTNERID$", "partnerId": "$MISPPARTNERID$", "partnerType": "MISP_Partner", "policyGroup": "$ID:DefinePolicyGroup_Misp_Valid_Smoke_sid_name$", "requesttime": "$TIMESTAMP$" }, output= { "status": "InProgress" }, inputTemplate=esignet/PmsIntegration/CreatePartner/createPartner, outputTemplate=esignet/PmsIntegration/CreatePartner/createPartnerResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=PartnerSelfRegistration Misp valid details, uniqueIdentifier=Dependent_Idrepo_createPartnerSelfRegistration_02, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:203)
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:93)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| Esignet_PartnerSelfRegistration_NonAuth_All_Valid_Smoke_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Esignet_PartnerSelfRegistration_NonAuth_All_Valid_Smoke_sid, endPoint=/v1/partnermanager/partners, role=partner, templateFields=null, input={ "address": "Bangalore", "contactNumber": "8553967372", "emailId": "$PARTNEREMAILNONAUTH$", "organizationName": "$PARTNERIDNONAUTH$", "partnerId": "$PARTNERIDNONAUTH$", "partnerType": "Auth_Partner", "policyGroup": "$ID:DefinePolicyGroup_All_Valid_Smoke_sid_name$", "requesttime": "$TIMESTAMP$" }, output= { "status": "InProgress" }, inputTemplate=esignet/PmsIntegration/CreatePartner/createPartner, outputTemplate=esignet/PmsIntegration/CreatePartner/createPartnerResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=PartnerSelfRegistration NonAuth all valid details, uniqueIdentifier=Dependent_Idrepo_createPartnerSelfRegistration_04, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:203)
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:93)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| Esignet_UploadCACertificate_All_Valid_Smoke |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=Esignet_UploadCACertificate_All_Valid_Smoke, endPoint=/v1/partnermanager/partners/certificate/ca/upload, role=partner, templateFields=null, input={ "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "certificateData": "$CACERT$", "requesttime": "$TIMESTAMP$" }, output= { "status": "Upload Success." }, inputTemplate=esignet/PmsIntegration/UploadCertificate/uploadCertificate, outputTemplate=esignet/PmsIntegration/UploadCertificate/uploadCertificateResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=upload CACertificate with all valid details, uniqueIdentifier=Dependent_Idrepo_uploadCACert_01, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:203)
at io.mosip.testrig.apirig.esignet.testscripts.SimplePost.test(SimplePost.java:87)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| Esignet_UploadCACertificate_Auth_False_Valid_Smoke |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=Esignet_UploadCACertificate_Auth_False_Valid_Smoke, endPoint=/v1/partnermanager/partners/certificate/ca/upload, role=partner, templateFields=null, input={ "partnerId": "$ID:PartnerSelfRegistration_Auth_False_Valid_Smoke_sid_partnerId$", "certificateData": "$MISPCACERT$", "requesttime": "$TIMESTAMP$" }, output= { "status": "Upload Success." }, inputTemplate=esignet/PmsIntegration/UploadCertificate/uploadCertificate, outputTemplate=esignet/PmsIntegration/UploadCertificate/uploadCertificateResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=upload CACertificate Auth false valid details, uniqueIdentifier=Dependent_Idrepo_uploadCACert_11, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:203)
at io.mosip.testrig.apirig.esignet.testscripts.SimplePost.test(SimplePost.java:87)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| Esignet_UploadCACertificate_Auth_S2_Valid_Smoke |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=Esignet_UploadCACertificate_Auth_S2_Valid_Smoke, endPoint=/v1/partnermanager/partners/certificate/ca/upload, role=partner, templateFields=null, input={ "partnerId": "$ID:PartnerSelfRegistration_Auth_S2_Valid_Smoke_sid_partnerId$", "certificateData": "$MISPCACERT$", "requesttime": "$TIMESTAMP$" }, output= { "status": "Upload Success." }, inputTemplate=esignet/PmsIntegration/UploadCertificate/uploadCertificate, outputTemplate=esignet/PmsIntegration/UploadCertificate/uploadCertificateResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=upload CACertificate Auth S2 valid details, uniqueIdentifier=Dependent_Idrepo_uploadCACert_15, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:203)
at io.mosip.testrig.apirig.esignet.testscripts.SimplePost.test(SimplePost.java:87)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| Esignet_UploadCACertificate_Kyc_All_Valid_Smoke |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=Esignet_UploadCACertificate_Kyc_All_Valid_Smoke, endPoint=/v1/partnermanager/partners/certificate/ca/upload, role=partner, templateFields=null, input={ "partnerId": "$ID:PartnerSelfRegistration_Kyc_Valid_Smoke_sid_partnerId$", "certificateData": "$CACERT$", "requesttime": "$TIMESTAMP$" }, output= { "status": "Upload Success." }, inputTemplate=esignet/PmsIntegration/UploadCertificate/uploadCertificate, outputTemplate=esignet/PmsIntegration/UploadCertificate/uploadCertificateResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=upload CACertificate Kyc with all valid details, uniqueIdentifier=Dependent_Idrepo_uploadCACert_05, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:203)
at io.mosip.testrig.apirig.esignet.testscripts.SimplePost.test(SimplePost.java:87)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| Esignet_UploadCACertificate_Misp_False_Valid_Smoke |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=Esignet_UploadCACertificate_Misp_False_Valid_Smoke, endPoint=/v1/partnermanager/partners/certificate/ca/upload, role=partner, templateFields=null, input={ "partnerId": "$ID:PartnerSelfRegistration_Misp_False_Valid_Smoke_sid_partnerId$", "certificateData": "$MISPCACERT$", "requesttime": "$TIMESTAMP$" }, output= { "status": "Upload Success." }, inputTemplate=esignet/PmsIntegration/UploadCertificate/uploadCertificate, outputTemplate=esignet/PmsIntegration/UploadCertificate/uploadCertificateResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=upload CACertificate Misp False valid details, uniqueIdentifier=Dependent_Idrepo_uploadCACert_09, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:203)
at io.mosip.testrig.apirig.esignet.testscripts.SimplePost.test(SimplePost.java:87)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| Esignet_UploadCACertificate_Misp_S2_Valid_Smoke |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=Esignet_UploadCACertificate_Misp_S2_Valid_Smoke, endPoint=/v1/partnermanager/partners/certificate/ca/upload, role=partner, templateFields=null, input={ "partnerId": "$ID:PartnerSelfRegistration_Misp_S2_Valid_Smoke_sid_partnerId$", "certificateData": "$MISPCACERT$", "requesttime": "$TIMESTAMP$" }, output= { "status": "Upload Success." }, inputTemplate=esignet/PmsIntegration/UploadCertificate/uploadCertificate, outputTemplate=esignet/PmsIntegration/UploadCertificate/uploadCertificateResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=upload CACertificate Misp S2 valid details, uniqueIdentifier=Dependent_Idrepo_uploadCACert_13, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:203)
at io.mosip.testrig.apirig.esignet.testscripts.SimplePost.test(SimplePost.java:87)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| Esignet_UploadCACertificate_Misp_Valid_Smoke |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=Esignet_UploadCACertificate_Misp_Valid_Smoke, endPoint=/v1/partnermanager/partners/certificate/ca/upload, role=partner, templateFields=null, input={ "partnerId": "$ID:PartnerSelfRegistration_Misp_Valid_Smoke_sid_partnerId$", "certificateData": "$MISPCACERT$", "requesttime": "$TIMESTAMP$" }, output= { "status": "Upload Success." }, inputTemplate=esignet/PmsIntegration/UploadCertificate/uploadCertificate, outputTemplate=esignet/PmsIntegration/UploadCertificate/uploadCertificateResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=upload CACertificate Misp valid details, uniqueIdentifier=Dependent_Idrepo_uploadCACert_03, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:203)
at io.mosip.testrig.apirig.esignet.testscripts.SimplePost.test(SimplePost.java:87)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| Esignet_UploadCACertificate_NonAuth_All_Valid_Smoke |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=Esignet_UploadCACertificate_NonAuth_All_Valid_Smoke, endPoint=/v1/partnermanager/partners/certificate/ca/upload, role=partner, templateFields=null, input={ "partnerId": "$ID:PartnerSelfRegistration_NonAuth_All_Valid_Smoke_sid_partnerId$", "certificateData": "$CACERT$", "requesttime": "$TIMESTAMP$" }, output= { "status": "Upload Success." }, inputTemplate=esignet/PmsIntegration/UploadCertificate/uploadCertificate, outputTemplate=esignet/PmsIntegration/UploadCertificate/uploadCertificateResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=upload CACertificate NonAuth with all valid details, uniqueIdentifier=Dependent_Idrepo_uploadCACert_07, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:203)
at io.mosip.testrig.apirig.esignet.testscripts.SimplePost.test(SimplePost.java:87)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| Esignet_UploadCInterCertificate_All_Valid_Smoke |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=Esignet_UploadCInterCertificate_All_Valid_Smoke, endPoint=/v1/partnermanager/partners/certificate/ca/upload, role=partner, templateFields=null, input={ "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "certificateData": "$INTERCERT$", "requesttime": "$TIMESTAMP$" }, output= { "status": "Upload Success." }, inputTemplate=esignet/PmsIntegration/UploadCertificate/uploadCertificate, outputTemplate=esignet/PmsIntegration/UploadCertificate/uploadCertificateResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=upload CACertificate with all valid details, uniqueIdentifier=Dependent_Idrepo_uploadCACert_02, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:203)
at io.mosip.testrig.apirig.esignet.testscripts.SimplePost.test(SimplePost.java:87)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| Esignet_UploadCInterCertificate_Auth_False_Valid_Smoke |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=Esignet_UploadCInterCertificate_Auth_False_Valid_Smoke, endPoint=/v1/partnermanager/partners/certificate/ca/upload, role=partner, templateFields=null, input={ "partnerId": "$ID:PartnerSelfRegistration_Auth_False_Valid_Smoke_sid_partnerId$", "certificateData": "$MISPINTERCERT$", "requesttime": "$TIMESTAMP$" }, output= { "status": "Upload Success." }, inputTemplate=esignet/PmsIntegration/UploadCertificate/uploadCertificate, outputTemplate=esignet/PmsIntegration/UploadCertificate/uploadCertificateResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=upload CACertificate Auth false valid details, uniqueIdentifier=Dependent_Idrepo_uploadCACert_12, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:203)
at io.mosip.testrig.apirig.esignet.testscripts.SimplePost.test(SimplePost.java:87)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| Esignet_UploadCInterCertificate_Auth_S2_Valid_Smoke |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=Esignet_UploadCInterCertificate_Auth_S2_Valid_Smoke, endPoint=/v1/partnermanager/partners/certificate/ca/upload, role=partner, templateFields=null, input={ "partnerId": "$ID:PartnerSelfRegistration_Auth_S2_Valid_Smoke_sid_partnerId$", "certificateData": "$MISPINTERCERT$", "requesttime": "$TIMESTAMP$" }, output= { "status": "Upload Success." }, inputTemplate=esignet/PmsIntegration/UploadCertificate/uploadCertificate, outputTemplate=esignet/PmsIntegration/UploadCertificate/uploadCertificateResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=upload CACertificate Auth S2 valid details, uniqueIdentifier=Dependent_Idrepo_uploadCACert_16, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:203)
at io.mosip.testrig.apirig.esignet.testscripts.SimplePost.test(SimplePost.java:87)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| Esignet_UploadCInterCertificate_Kyc_All_Valid_Smoke |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=Esignet_UploadCInterCertificate_Kyc_All_Valid_Smoke, endPoint=/v1/partnermanager/partners/certificate/ca/upload, role=partner, templateFields=null, input={ "partnerId": "$ID:PartnerSelfRegistration_Kyc_Valid_Smoke_sid_partnerId$", "certificateData": "$INTERCERT$", "requesttime": "$TIMESTAMP$" }, output= { "status": "Upload Success." }, inputTemplate=esignet/PmsIntegration/UploadCertificate/uploadCertificate, outputTemplate=esignet/PmsIntegration/UploadCertificate/uploadCertificateResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=upload CACertificate Kyc with all valid details, uniqueIdentifier=Dependent_Idrepo_uploadCACert_06, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:203)
at io.mosip.testrig.apirig.esignet.testscripts.SimplePost.test(SimplePost.java:87)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| Esignet_UploadCInterCertificate_Misp_False_Valid_Smoke |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=Esignet_UploadCInterCertificate_Misp_False_Valid_Smoke, endPoint=/v1/partnermanager/partners/certificate/ca/upload, role=partner, templateFields=null, input={ "partnerId": "$ID:PartnerSelfRegistration_Misp_False_Valid_Smoke_sid_partnerId$", "certificateData": "$MISPINTERCERT$", "requesttime": "$TIMESTAMP$" }, output= { "status": "Upload Success." }, inputTemplate=esignet/PmsIntegration/UploadCertificate/uploadCertificate, outputTemplate=esignet/PmsIntegration/UploadCertificate/uploadCertificateResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=upload CACertificate Misp false valid details, uniqueIdentifier=Dependent_Idrepo_uploadCACert_10, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:203)
at io.mosip.testrig.apirig.esignet.testscripts.SimplePost.test(SimplePost.java:87)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| Esignet_UploadCInterCertificate_Misp_S2_Valid_Smoke |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=Esignet_UploadCInterCertificate_Misp_S2_Valid_Smoke, endPoint=/v1/partnermanager/partners/certificate/ca/upload, role=partner, templateFields=null, input={ "partnerId": "$ID:PartnerSelfRegistration_Misp_S2_Valid_Smoke_sid_partnerId$", "certificateData": "$MISPINTERCERT$", "requesttime": "$TIMESTAMP$" }, output= { "status": "Upload Success." }, inputTemplate=esignet/PmsIntegration/UploadCertificate/uploadCertificate, outputTemplate=esignet/PmsIntegration/UploadCertificate/uploadCertificateResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=upload CACertificate Misp S2 valid details, uniqueIdentifier=Dependent_Idrepo_uploadCACert_14, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:203)
at io.mosip.testrig.apirig.esignet.testscripts.SimplePost.test(SimplePost.java:87)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| Esignet_UploadCInterCertificate_Misp_Valid_Smoke |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=Esignet_UploadCInterCertificate_Misp_Valid_Smoke, endPoint=/v1/partnermanager/partners/certificate/ca/upload, role=partner, templateFields=null, input={ "partnerId": "$ID:PartnerSelfRegistration_Misp_Valid_Smoke_sid_partnerId$", "certificateData": "$MISPINTERCERT$", "requesttime": "$TIMESTAMP$" }, output= { "status": "Upload Success." }, inputTemplate=esignet/PmsIntegration/UploadCertificate/uploadCertificate, outputTemplate=esignet/PmsIntegration/UploadCertificate/uploadCertificateResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=upload CACertificate Misp valid details, uniqueIdentifier=Dependent_Idrepo_uploadCACert_04, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:203)
at io.mosip.testrig.apirig.esignet.testscripts.SimplePost.test(SimplePost.java:87)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| Esignet_UploadCInterCertificate_NonAuth_All_Valid_Smoke |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=Esignet_UploadCInterCertificate_NonAuth_All_Valid_Smoke, endPoint=/v1/partnermanager/partners/certificate/ca/upload, role=partner, templateFields=null, input={ "partnerId": "$ID:PartnerSelfRegistration_NonAuth_All_Valid_Smoke_sid_partnerId$", "certificateData": "$INTERCERT$", "requesttime": "$TIMESTAMP$" }, output= { "status": "Upload Success." }, inputTemplate=esignet/PmsIntegration/UploadCertificate/uploadCertificate, outputTemplate=esignet/PmsIntegration/UploadCertificate/uploadCertificateResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=upload CACertificate NonAuth all valid details, uniqueIdentifier=Dependent_Idrepo_uploadCACert_08, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:203)
at io.mosip.testrig.apirig.esignet.testscripts.SimplePost.test(SimplePost.java:87)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| Esignet_UploadPartnerCert_All_Valid_Smoke |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Esignet_UploadPartnerCert_All_Valid_Smoke, endPoint=/v1/partnermanager/partners/certificate/upload, role=partner, templateFields=null, input={ "certificateData": "$PARTNERCERT$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requesttime": "$TIMESTAMP$" }, output= { }, inputTemplate=esignet/PmsIntegration/UploadCert/uploadCert, outputTemplate=esignet/PmsIntegration/UploadCert/uploadCertResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Upload partner certificate with all valid details, uniqueIdentifier=Dependent_Idrepo_uploadPartnerCert_01, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:203)
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:93)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| Esignet_UploadPartnerCert_Auth_False_Valid_Smoke |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Esignet_UploadPartnerCert_Auth_False_Valid_Smoke, endPoint=/v1/partnermanager/partners/certificate/upload, role=partner, templateFields=null, input={ "certificateData": "$MISPPARTNERCERT$", "partnerId": "$ID:PartnerSelfRegistration_Auth_False_Valid_Smoke_sid_partnerId$", "requesttime": "$TIMESTAMP$" }, output= { }, inputTemplate=esignet/PmsIntegration/UploadCert/uploadCert, outputTemplate=esignet/PmsIntegration/UploadCert/uploadCertResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Upload partner certificate Auth false valid details, uniqueIdentifier=Dependent_Idrepo_uploadPartnerCert_06, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:203)
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:93)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| Esignet_UploadPartnerCert_Auth_S2_Valid_Smoke |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Esignet_UploadPartnerCert_Auth_S2_Valid_Smoke, endPoint=/v1/partnermanager/partners/certificate/upload, role=partner, templateFields=null, input={ "certificateData": "$MISPPARTNERCERT$", "partnerId": "$ID:PartnerSelfRegistration_Auth_S2_Valid_Smoke_sid_partnerId$", "requesttime": "$TIMESTAMP$" }, output= { }, inputTemplate=esignet/PmsIntegration/UploadCert/uploadCert, outputTemplate=esignet/PmsIntegration/UploadCert/uploadCertResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Upload partner certificate Auth S2 valid details, uniqueIdentifier=Dependent_Idrepo_uploadPartnerCert_08, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:203)
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:93)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| Esignet_UploadPartnerCert_Kyc_All_Valid_Smoke |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Esignet_UploadPartnerCert_Kyc_All_Valid_Smoke, endPoint=/v1/partnermanager/partners/certificate/upload, role=partner, templateFields=null, input={ "certificateData": "$PARTNERCERT$", "partnerId": "$ID:PartnerSelfRegistration_Kyc_Valid_Smoke_sid_partnerId$", "requesttime": "$TIMESTAMP$" }, output= { }, inputTemplate=esignet/PmsIntegration/UploadCert/uploadCert, outputTemplate=esignet/PmsIntegration/UploadCert/uploadCertResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Upload partner certificate Kyc all valid details, uniqueIdentifier=Dependent_Idrepo_uploadPartnerCert_03, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:203)
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:93)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| Esignet_UploadPartnerCert_Misp_False_Valid_Smoke |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Esignet_UploadPartnerCert_Misp_False_Valid_Smoke, endPoint=/v1/partnermanager/partners/certificate/upload, role=partner, templateFields=null, input={ "certificateData": "$MISPPARTNERCERT$", "partnerId": "$ID:PartnerSelfRegistration_Misp_False_Valid_Smoke_sid_partnerId$", "requesttime": "$TIMESTAMP$" }, output= { }, inputTemplate=esignet/PmsIntegration/UploadCert/uploadCert, outputTemplate=esignet/PmsIntegration/UploadCert/uploadCertResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Upload partner certificate Misp false valid details, uniqueIdentifier=Dependent_Idrepo_uploadPartnerCert_05, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:203)
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:93)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| Esignet_UploadPartnerCert_Misp_S2_Valid_Smoke |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Esignet_UploadPartnerCert_Misp_S2_Valid_Smoke, endPoint=/v1/partnermanager/partners/certificate/upload, role=partner, templateFields=null, input={ "certificateData": "$MISPPARTNERCERT$", "partnerId": "$ID:PartnerSelfRegistration_Misp_S2_Valid_Smoke_sid_partnerId$", "requesttime": "$TIMESTAMP$" }, output= { }, inputTemplate=esignet/PmsIntegration/UploadCert/uploadCert, outputTemplate=esignet/PmsIntegration/UploadCert/uploadCertResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Upload partner certificate Misp S2 valid details, uniqueIdentifier=Dependent_Idrepo_uploadPartnerCert_07, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:203)
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:93)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| Esignet_UploadPartnerCert_Misp_Valid_Smoke_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Esignet_UploadPartnerCert_Misp_Valid_Smoke_sid, endPoint=/v1/partnermanager/partners/certificate/upload, role=partner, templateFields=null, input={ "certificateData": "$MISPPARTNERCERT$", "partnerId": "$ID:PartnerSelfRegistration_Misp_Valid_Smoke_sid_partnerId$", "requesttime": "$TIMESTAMP$" }, output= { }, inputTemplate=esignet/PmsIntegration/UploadCert/uploadCert, outputTemplate=esignet/PmsIntegration/UploadCert/uploadCertResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Upload partner certificate Misp valid details, uniqueIdentifier=Dependent_Idrepo_uploadPartnerCert_02, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:203)
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:93)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| Esignet_UploadPartnerCert_NonAuth_All_Valid_Smoke |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Esignet_UploadPartnerCert_NonAuth_All_Valid_Smoke, endPoint=/v1/partnermanager/partners/certificate/upload, role=partner, templateFields=null, input={ "certificateData": "$PARTNERCERT$", "partnerId": "$ID:PartnerSelfRegistration_NonAuth_All_Valid_Smoke_sid_partnerId$", "requesttime": "$TIMESTAMP$" }, output= { }, inputTemplate=esignet/PmsIntegration/UploadCert/uploadCert, outputTemplate=esignet/PmsIntegration/UploadCert/uploadCertResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Upload partner certificate NonAuth all valid details, uniqueIdentifier=Dependent_Idrepo_uploadPartnerCert_04, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:203)
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:93)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_updatePartnerCertificate_StatusCode_AuthDemoUrl_All_Valid_Smoke |
| Testcase Dependency |
| [] |
| Class Name |
| PostWithBodyAndQueryParamsForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_updatePartnerCertificate_StatusCode_AuthDemoUrl_All_Valid_Smoke, endPoint=/v1/identity/updatePartnerCertificate, role=partner, templateFields=null, input={ "certData": "$ID:UploadPartnerCert_Misp_Valid_Smoke_sid_signedCertificateData$", "partnerType": "MISP", "partnerName": "$ID:PartnerSelfRegistration_Misp_Valid_Smoke_sid_partnerId$", "keyFileNameByPartnerName": "true", "moduleName": "esignet" }, output=200, inputTemplate=esignet/PmsIntegration/UpdatePartnerCertificate/updatePartnerCertificate, outputTemplate=esignet/PmsIntegration/UpdatePartnerCertificate/updatePartnerCertificateResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Update partner certificate statusCode AuthDemoUrl all valid details, uniqueIdentifier=Dependent_Idrepo_updatePartnerCertificate_01, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:203)
at io.mosip.testrig.apirig.esignet.testscripts.PostWithBodyAndQueryParamsForAutoGenId.test(PostWithBodyAndQueryParamsForAutoGenId.java:71)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| Esignet_SubmitPartnerApiKeyRequest_Kyc_Rejection_All_Valid_Smoke_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Esignet_SubmitPartnerApiKeyRequest_Kyc_Rejection_All_Valid_Smoke_sid, endPoint=/v1/partnermanager/partners/$ID:PartnerSelfRegistration_Kyc_Valid_Smoke_sid_partnerId$/policy/map, role=partner, templateFields=null, input={ "policyName": "$ID:DefinePolicy_Auth_Valid_Smoke_sid_name$", "useCaseDescription": "Need to submit the payment", "requesttime": "$TIMESTAMP$" }, output={ "message": "Policy mapping request submitted successfully." }, inputTemplate=esignet/PmsIntegration/RequestAPIKey/requestApiKey, outputTemplate=esignet/PmsIntegration/RequestAPIKey/requestAPIKeyResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Submit partner Api Key request Kyc rejection all valid details, uniqueIdentifier=Dependent_Idrepo_RequestAPIKeyForAuthPartner_03, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:203)
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:93)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| Esignet_SubmitPartnerApiKeyRequest_Rejection_All_Valid_Smoke_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Esignet_SubmitPartnerApiKeyRequest_Rejection_All_Valid_Smoke_sid, endPoint=/v1/partnermanager/partners/$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$/policy/map, role=partner, templateFields=null, input={ "policyName": "$ID:DefinePolicy_All_Valid_Smoke_sid_name$", "useCaseDescription": "Need to submit the payment", "requesttime": "$TIMESTAMP$" }, output={ "message": "Policy mapping request submitted successfully." }, inputTemplate=esignet/PmsIntegration/RequestAPIKey/requestApiKey, outputTemplate=esignet/PmsIntegration/RequestAPIKey/requestAPIKeyResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Submit partner Api Key request rejection all valid details, uniqueIdentifier=Dependent_Idrepo_RequestAPIKeyForAuthPartner_01, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:203)
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:93)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| Esignet_SubmitPartnerApiKeyRequest_Rejection_Auth_False_Valid_Smoke_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Esignet_SubmitPartnerApiKeyRequest_Rejection_Auth_False_Valid_Smoke_sid, endPoint=/v1/partnermanager/partners/$ID:PartnerSelfRegistration_Auth_False_Valid_Smoke_sid_partnerId$/policy/map, role=partner, templateFields=null, input={ "policyName": "$ID:DefinePolicy_Auth_False_Valid_Smoke_sid_name$", "useCaseDescription": "Need submit the payment", "requesttime": "$TIMESTAMP$" }, output={ "message": "Policy mapping request submitted successfully." }, inputTemplate=esignet/PmsIntegration/RequestAPIKey/requestApiKey, outputTemplate=esignet/PmsIntegration/RequestAPIKey/requestAPIKeyResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Submit partner Api Key request rejection Auth false valid details, uniqueIdentifier=Dependent_Idrepo_RequestAPIKeyForAuthPartner_06, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:203)
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:93)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| Esignet_SubmitPartnerApiKeyRequest_Rejection_Misp_False_Valid_Smoke_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Esignet_SubmitPartnerApiKeyRequest_Rejection_Misp_False_Valid_Smoke_sid, endPoint=/v1/partnermanager/partners/$ID:PartnerSelfRegistration_Misp_False_Valid_Smoke_sid_partnerId$/policy/map, role=partner, templateFields=null, input={ "policyName": "$ID:DefinePolicy_Misp_False_Valid_Smoke_sid_name$", "useCaseDescription": "Need submit the payment", "requesttime": "$TIMESTAMP$" }, output={ "message": "Policy mapping request submitted successfully." }, inputTemplate=esignet/PmsIntegration/RequestAPIKey/requestApiKey, outputTemplate=esignet/PmsIntegration/RequestAPIKey/requestAPIKeyResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Submit partner Api Key request rejection Misp false valid details, uniqueIdentifier=Dependent_Idrepo_RequestAPIKeyForAuthPartner_05, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:203)
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:93)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| Esignet_SubmitPartnerApiKeyRequest_Rejection_Misp_Valid_Smoke_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Esignet_SubmitPartnerApiKeyRequest_Rejection_Misp_Valid_Smoke_sid, endPoint=/v1/partnermanager/partners/$ID:PartnerSelfRegistration_Misp_Valid_Smoke_sid_partnerId$/policy/map, role=partner, templateFields=null, input={ "policyName": "$ID:DefinePolicy_Misp_Valid_Smoke_sid_name$", "useCaseDescription": "Need submit the payment", "requesttime": "$TIMESTAMP$" }, output={ "message": "Policy mapping request submitted successfully." }, inputTemplate=esignet/PmsIntegration/RequestAPIKey/requestApiKey, outputTemplate=esignet/PmsIntegration/RequestAPIKey/requestAPIKeyResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Submit partner Api Key request rejection Misp valid details, uniqueIdentifier=Dependent_Idrepo_RequestAPIKeyForAuthPartner_02, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:203)
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:93)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| Esignet_SubmitPartnerApiKeyRequest_Rejection_NonAuth_All_Valid_Smoke_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Esignet_SubmitPartnerApiKeyRequest_Rejection_NonAuth_All_Valid_Smoke_sid, endPoint=/v1/partnermanager/partners/$ID:PartnerSelfRegistration_NonAuth_All_Valid_Smoke_sid_partnerId$/policy/map, role=partner, templateFields=null, input={ "policyName": "$ID:DefinePolicy_NonAuth_All_Valid_Smoke_sid_name$", "useCaseDescription": "Need to submit the payment", "requesttime": "$TIMESTAMP$" }, output={ "message": "Policy mapping request submitted successfully." }, inputTemplate=esignet/PmsIntegration/RequestAPIKey/requestApiKey, outputTemplate=esignet/PmsIntegration/RequestAPIKey/requestAPIKeyResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Submit partner Api Key request rejection NonAuth all valid details, uniqueIdentifier=Dependent_Idrepo_RequestAPIKeyForAuthPartner_04, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:203)
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:93)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| Esignet_ApproveRejectPartnerAPIKeyReq_All_Valid_Smoke |
| Testcase Dependency |
| [] |
| Class Name |
| PutWithPathParamsAndBody |
| Testcase Input |
| testCaseName=Esignet_ApproveRejectPartnerAPIKeyReq_All_Valid_Smoke, endPoint=/v1/partnermanager/partners/policy/{mappingkey}, role=partner, templateFields=null, input={ "status": "Approved", "mappingkey": "$ID:SubmitPartnerApiKeyRequest_Rejection_All_Valid_Smoke_sid_mappingkey$", "requesttime": "$TIMESTAMP$" }, output={ "response": "Policy mapping approved successfully" }, inputTemplate=esignet/PmsIntegration/ApproveAPIKey/approveAPIKey, outputTemplate=esignet/PmsIntegration/ApproveAPIKey/approveAPIKeyResult, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Approve or Reject partner Api key request all valid details, uniqueIdentifier=Dependent_Idrepo_ApproveAPIKey_01, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:203)
at io.mosip.testrig.apirig.esignet.testscripts.PutWithPathParamsAndBody.test(PutWithPathParamsAndBody.java:86)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| Esignet_ApproveRejectPartnerAPIKeyReq_Auth_False_Valid_Smoke |
| Testcase Dependency |
| [] |
| Class Name |
| PutWithPathParamsAndBody |
| Testcase Input |
| testCaseName=Esignet_ApproveRejectPartnerAPIKeyReq_Auth_False_Valid_Smoke, endPoint=/v1/partnermanager/partners/policy/{mappingkey}, role=partner, templateFields=null, input={ "status": "Approved", "mappingkey": "$ID:SubmitPartnerApiKeyRequest_Rejection_Auth_False_Valid_Smoke_sid_mappingkey$", "requesttime": "$TIMESTAMP$" }, output={ "response": "Policy mapping approved successfully" }, inputTemplate=esignet/PmsIntegration/ApproveAPIKey/approveAPIKey, outputTemplate=esignet/PmsIntegration/ApproveAPIKey/approveAPIKeyResult, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Approve or Reject partner Api key request Auth false valid details, uniqueIdentifier=Dependent_Idrepo_ApproveAPIKey_06, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:203)
at io.mosip.testrig.apirig.esignet.testscripts.PutWithPathParamsAndBody.test(PutWithPathParamsAndBody.java:86)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| Esignet_ApproveRejectPartnerAPIKeyReq_Kyc_All_Valid_Smoke |
| Testcase Dependency |
| [] |
| Class Name |
| PutWithPathParamsAndBody |
| Testcase Input |
| testCaseName=Esignet_ApproveRejectPartnerAPIKeyReq_Kyc_All_Valid_Smoke, endPoint=/v1/partnermanager/partners/policy/{mappingkey}, role=partner, templateFields=null, input={ "status": "Approved", "mappingkey": "$ID:SubmitPartnerApiKeyRequest_Kyc_Rejection_All_Valid_Smoke_sid_mappingkey$", "requesttime": "$TIMESTAMP$" }, output={ "response": "Policy mapping approved successfully" }, inputTemplate=esignet/PmsIntegration/ApproveAPIKey/approveAPIKey, outputTemplate=esignet/PmsIntegration/ApproveAPIKey/approveAPIKeyResult, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Approve or Reject partner Api key request Kyc all valid details, uniqueIdentifier=Dependent_Idrepo_ApproveAPIKey_03, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:203)
at io.mosip.testrig.apirig.esignet.testscripts.PutWithPathParamsAndBody.test(PutWithPathParamsAndBody.java:86)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| Esignet_ApproveRejectPartnerAPIKeyReq_Misp_False_Valid_Smoke |
| Testcase Dependency |
| [] |
| Class Name |
| PutWithPathParamsAndBody |
| Testcase Input |
| testCaseName=Esignet_ApproveRejectPartnerAPIKeyReq_Misp_False_Valid_Smoke, endPoint=/v1/partnermanager/partners/policy/{mappingkey}, role=partner, templateFields=null, input={ "status": "Approved", "mappingkey": "$ID:SubmitPartnerApiKeyRequest_Rejection_Misp_False_Valid_Smoke_sid_mappingkey$", "requesttime": "$TIMESTAMP$" }, output={ "response": "Policy mapping approved successfully" }, inputTemplate=esignet/PmsIntegration/ApproveAPIKey/approveAPIKey, outputTemplate=esignet/PmsIntegration/ApproveAPIKey/approveAPIKeyResult, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Approve or Reject partner Api key request Misp false valid details, uniqueIdentifier=Dependent_Idrepo_ApproveAPIKey_05, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:203)
at io.mosip.testrig.apirig.esignet.testscripts.PutWithPathParamsAndBody.test(PutWithPathParamsAndBody.java:86)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| Esignet_ApproveRejectPartnerAPIKeyReq_Misp_Valid_Smoke |
| Testcase Dependency |
| [] |
| Class Name |
| PutWithPathParamsAndBody |
| Testcase Input |
| testCaseName=Esignet_ApproveRejectPartnerAPIKeyReq_Misp_Valid_Smoke, endPoint=/v1/partnermanager/partners/policy/{mappingkey}, role=partner, templateFields=null, input={ "status": "Approved", "mappingkey": "$ID:SubmitPartnerApiKeyRequest_Rejection_Misp_Valid_Smoke_sid_mappingkey$", "requesttime": "$TIMESTAMP$" }, output={ "response": "Policy mapping approved successfully" }, inputTemplate=esignet/PmsIntegration/ApproveAPIKey/approveAPIKey, outputTemplate=esignet/PmsIntegration/ApproveAPIKey/approveAPIKeyResult, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Approve or Reject partner Api key request Misp valid details, uniqueIdentifier=Dependent_Idrepo_ApproveAPIKey_02, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:203)
at io.mosip.testrig.apirig.esignet.testscripts.PutWithPathParamsAndBody.test(PutWithPathParamsAndBody.java:86)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| Esignet_ApproveRejectPartnerAPIKeyReq_NonAuth_All_Valid_Smoke |
| Testcase Dependency |
| [] |
| Class Name |
| PutWithPathParamsAndBody |
| Testcase Input |
| testCaseName=Esignet_ApproveRejectPartnerAPIKeyReq_NonAuth_All_Valid_Smoke, endPoint=/v1/partnermanager/partners/policy/{mappingkey}, role=partner, templateFields=null, input={ "status": "Approved", "mappingkey": "$ID:SubmitPartnerApiKeyRequest_Rejection_NonAuth_All_Valid_Smoke_sid_mappingkey$", "requesttime": "$TIMESTAMP$" }, output={ "response": "Policy mapping approved successfully" }, inputTemplate=esignet/PmsIntegration/ApproveAPIKey/approveAPIKey, outputTemplate=esignet/PmsIntegration/ApproveAPIKey/approveAPIKeyResult, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Approve or Reject partner Api key request NonAuth all valid details, uniqueIdentifier=Dependent_Idrepo_ApproveAPIKey_04, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:203)
at io.mosip.testrig.apirig.esignet.testscripts.PutWithPathParamsAndBody.test(PutWithPathParamsAndBody.java:86)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| Esignet_UpdatePolicy__AfterPublished_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PutWithPathParamsAndBody |
| Testcase Input |
| testCaseName=Esignet_UpdatePolicy__AfterPublished_Neg, endPoint=/v1/policymanager/policies/{policyId}, role=partner, templateFields=null, input={ "desc": "$POLICYDESC$", "name": "$POLICYNAME$", "policyGroupName": "$ID:DefinePolicyGroup_All_Valid_Smoke_sid_name$", "policyType": "Auth", "version": "1.0", "requesttime": "$TIMESTAMP$", "policyId": "$ID:DefinePolicy_All_Valid_Smoke_sid_id$" }, output= { "errors": [ { "errorCode": "PMS_POL_055" } ] }, inputTemplate=esignet/PmsIntegration/UpdatePolicy/UpdatePolicy, outputTemplate=esignet/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Update policy after published, uniqueIdentifier=Dependent_Idrepo_UpdatePolicy_01, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:203)
at io.mosip.testrig.apirig.esignet.testscripts.PutWithPathParamsAndBody.test(PutWithPathParamsAndBody.java:86)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| Esignet_DeactivatePolicy_After_Publish_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PatchWithPathParamsAndBody |
| Testcase Input |
| testCaseName=Esignet_DeactivatePolicy_After_Publish_Neg, endPoint=/v1/policymanager/policies/{policyId}/group/{policygroupId}, role=partner, templateFields=null, input={ "policygroupId": "$ID:DefinePolicyGroup_All_Valid_Smoke_sid_id$", "policyId": "$ID:DefinePolicy_NonAuth_All_Valid_Smoke_sid_id$", "requesttime": "$TIMESTAMP$", "status": "De-active" }, output= { "errors": [ { "errorCode": "PMS_POL_058" } ] }, inputTemplate=esignet/PmsIntegration/DeactivatePolicy/DeactivatePolicy, outputTemplate=esignet/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Deactivate policy after published, uniqueIdentifier=Dependent_Idrepo_DeactivatePolicy_01, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:203)
at io.mosip.testrig.apirig.esignet.testscripts.PatchWithPathParamsAndBody.test(PatchWithPathParamsAndBody.java:83)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| Esignet_GenerateMispLK_All_Valid_Smoke_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Esignet_GenerateMispLK_All_Valid_Smoke_sid, endPoint=/v1/partnermanager/misps, role=partner, templateFields=null, input={ "providerId": "$ID:PartnerSelfRegistration_Misp_Valid_Smoke_sid_partnerId$", "requesttime": "$TIMESTAMP$" }, output= { }, inputTemplate=esignet/PmsIntegration/GenerateMispLK/GenerateMispLK, outputTemplate=esignet/PmsIntegration/GenerateMispLK/GenerateMispLKResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generate MispLk all valid details, uniqueIdentifier=Dependent_Idrepo_GenerateMispLK_01, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:203)
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:93)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| Esignet_GenerateMispLK_Misp_False_Valid_Smoke_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Esignet_GenerateMispLK_Misp_False_Valid_Smoke_sid, endPoint=/v1/partnermanager/misps, role=partner, templateFields=null, input={ "providerId": "$ID:PartnerSelfRegistration_Misp_False_Valid_Smoke_sid_partnerId$", "requesttime": "$TIMESTAMP$" }, output= { }, inputTemplate=esignet/PmsIntegration/GenerateMispLK/GenerateMispLK, outputTemplate=esignet/PmsIntegration/GenerateMispLK/GenerateMispLKResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generate MispLk Misp false valid details, uniqueIdentifier=Dependent_Idrepo_GenerateMispLK_02, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:203)
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:93)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| Esignet_GenerateMispLK_Misp_S2_Valid_Smoke_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Esignet_GenerateMispLK_Misp_S2_Valid_Smoke_sid, endPoint=/v1/partnermanager/misps, role=partner, templateFields=null, input={ "providerId": "$ID:PartnerSelfRegistration_Misp_S2_Valid_Smoke_sid_partnerId$", "requesttime": "$TIMESTAMP$" }, output= { }, inputTemplate=esignet/PmsIntegration/GenerateMispLK/GenerateMispLK, outputTemplate=esignet/PmsIntegration/GenerateMispLK/GenerateMispLKResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generate MispLk Misp S2 valid details, uniqueIdentifier=Dependent_Idrepo_GenerateMispLK_03, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:203)
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:93)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_GenerateApiKeyKyc_Valid_Smoke_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePatchForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_GenerateApiKeyKyc_Valid_Smoke_sid, endPoint=/v1/partnermanager/partners/$ID:PartnerSelfRegistration_Kyc_Valid_Smoke_sid_partnerId$/generate/apikey, role=esignetpartnerkyc, templateFields=null, input={ "requesttime": "$TIMESTAMP$", "policyName": "$ID:DefinePolicy_Auth_Valid_Smoke_sid_name$", "label": "ABCD" }, output={ }, inputTemplate=esignet/GenerateApiKey/GenerateApiKey, outputTemplate=esignet/GenerateApiKey/GenerateApiKeyResult, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generate Api key Kyc valid details, uniqueIdentifier=Dependent_Idrepo_GenerateApiKey_02, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:203)
at io.mosip.testrig.apirig.esignet.testscripts.SimplePatchForAutoGenId.test(SimplePatchForAutoGenId.java:85)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_GenerateApiKey_Valid_Smoke_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePatchForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_GenerateApiKey_Valid_Smoke_sid, endPoint=/v1/partnermanager/partners/$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$/generate/apikey, role=esignetpartner, templateFields=null, input={ "requesttime": "$TIMESTAMP$", "policyName": "$ID:DefinePolicy_All_Valid_Smoke_sid_name$", "label": "ABCD" }, output={ }, inputTemplate=esignet/GenerateApiKey/GenerateApiKey, outputTemplate=esignet/GenerateApiKey/GenerateApiKeyResult, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generate Api key with valid details, uniqueIdentifier=Dependent_Idrepo_GenerateApiKey_01, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:203)
at io.mosip.testrig.apirig.esignet.testscripts.SimplePatchForAutoGenId.test(SimplePatchForAutoGenId.java:85)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| Esignet_CreateOIDCClientV3PAR_all_Valid_Smoke_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Esignet_CreateOIDCClientV3PAR_all_Valid_Smoke_sid, endPoint=/v1/partnermanager/oidc/client, role=partner, templateFields=null, input={ "name": "$RANDOMID$", "policyId": "$ID:DefinePolicy_All_Valid_Smoke_sid_id$", "publicKey": "$OIDC_JWK_KEY_PAR$", "authPartnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "logoUri": "https://health-services.com/logo.png", "redirectUris": "$IDPREDIRECTURI$", "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt", "require_pushed_authorization_requests": true }, output={ "status": "ACTIVE" }, inputTemplate=esignet/OidcClient/OIDCClientPAR, outputTemplate=esignet/OidcClient/OIDCClientResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create OIDC client with all valid details for MOSIP ID PAR flow, uniqueIdentifier=TC_ESignet_CreateOIDCClient_25, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:203)
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:93)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| Esignet_CreateOIDCClient_Auth_False_Valid_Smoke_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Esignet_CreateOIDCClient_Auth_False_Valid_Smoke_sid, endPoint=/v1/partnermanager/oidc/client, role=partner, templateFields=null, input={ "name": "$RANDOMID$", "policyId": "$ID:DefinePolicy_Auth_False_Valid_Smoke_sid_id$", "publicKey": "$JWKKEY$", "authPartnerId": "$ID:PartnerSelfRegistration_Auth_False_Valid_Smoke_sid_partnerId$", "logoUri": "https://health-services.com/logo.png", "redirectUris": "$IDPREDIRECTURI$", "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt" }, output={ "status": "ACTIVE" }, inputTemplate=esignet/OidcClient/OIDCClient, outputTemplate=esignet/OidcClient/OIDCClientResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create OIDC client Auth false valid details, uniqueIdentifier=TC_ESignet_CreateOIDCClient_04, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:203)
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:93)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| Esignet_CreateOIDCClient_Auth_S2_Valid_Smoke_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Esignet_CreateOIDCClient_Auth_S2_Valid_Smoke_sid, endPoint=/v1/partnermanager/oidc/client, role=partner, templateFields=null, input={ "name": "$RANDOMID$", "policyId": "$ID:DefinePolicy_Auth_S2_Valid_Smoke_sid_id$", "publicKey": "$JWKKEY$", "authPartnerId": "$ID:PartnerSelfRegistration_Auth_S2_Valid_Smoke_sid_partnerId$", "logoUri": "https://health-services.com/logo.png", "redirectUris": "$IDPREDIRECTURI$", "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt" }, output={ "errors": [ { "errorCode": "PMS_PRT_061", "message": "Partner policy mapping not exists." } ] }, inputTemplate=esignet/OidcClient/OIDCClient, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create OIDC client Auth S2 valid details, uniqueIdentifier=TC_ESignet_CreateOIDCClient_05, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:203)
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:93)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| Esignet_CreateOIDCClient_InValid_Partner_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Esignet_CreateOIDCClient_InValid_Partner_sid, endPoint=/v1/partnermanager/oidc/client, role=partner, templateFields=null, input={ "name": "$RANDOMID$", "policyId": "$ID:DefinePolicy_All_Valid_Smoke_sid_id$", "publicKey": "$OIDCJWKKEY2$", "authPartnerId": "sjsjjsjsjsjsjjs", "logoUri": "https://health-services.com/logo.png", "redirectUris": "$IDPREDIRECTURI$", "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt" }, output={ "errors": [ { "errorCode": "PMS_PRT_058", "message": "Partner policy mapping not exists." } ] }, inputTemplate=esignet/OidcClient/OIDCClient, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create OIDC client with invalid partner, uniqueIdentifier=TC_ESignet_CreateOIDCClient_08, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:203)
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:93)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| Esignet_CreateOIDCClient_InValid_logoUri_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Esignet_CreateOIDCClient_InValid_logoUri_sid, endPoint=/v1/partnermanager/oidc/client, role=partner, templateFields=null, input={ "name": "$RANDOMID$", "policyId": "$ID:DefinePolicy_All_Valid_Smoke_sid_id$", "publicKey": "$OIDCJWKKEY2$", "authPartnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "logoUri": "djxjdjjdjdpng.cndi", "redirectUris": "$IDPREDIRECTURI$", "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt" }, output={ "errors": [ { "errorCode": "PMS_COR_001", "message": "Invalid request parameter - must be a valid URL :request.logoUri" } ] }, inputTemplate=esignet/OidcClient/OIDCClient, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create OIDC client with invalid logoUri, uniqueIdentifier=TC_ESignet_CreateOIDCClient_07, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:203)
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:93)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| Esignet_CreateOIDCClient_Misp_Valid_Smoke_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Esignet_CreateOIDCClient_Misp_Valid_Smoke_sid, endPoint=/v1/partnermanager/oidc/client, role=partner, templateFields=null, input={ "name": "$RANDOMID$", "policyId": "$ID:DefinePolicy_Auth_Valid_Smoke_sid_id$", "publicKey": "$OIDCJWKKEY3$", "authPartnerId": "$ID:PartnerSelfRegistration_Kyc_Valid_Smoke_sid_partnerId$", "logoUri": "https://health-services.com/logo.png", "redirectUris": "$IDPREDIRECTURI$", "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt" }, output={ "status": "ACTIVE" }, inputTemplate=esignet/OidcClient/OIDCClient, outputTemplate=esignet/OidcClient/OIDCClientResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create OIDC client Misp valid details, uniqueIdentifier=TC_ESignet_CreateOIDCClient_03, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:203)
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:93)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| Esignet_CreateOIDCClient_NonAuth_all_Valid_Smoke_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Esignet_CreateOIDCClient_NonAuth_all_Valid_Smoke_sid, endPoint=/v1/partnermanager/oidc/client, role=partner, templateFields=null, input={ "name": "$RANDOMID$", "policyId": "$ID:DefinePolicy_NonAuth_All_Valid_Smoke_sid_id$", "publicKey": "$JWKKEY$", "authPartnerId": "$ID:PartnerSelfRegistration_NonAuth_All_Valid_Smoke_sid_partnerId$", "logoUri": "https://health-services.com/logo.png", "redirectUris": "$IDPREDIRECTURI$", "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt" }, output={ "status": "ACTIVE" }, inputTemplate=esignet/OidcClient/OIDCClient, outputTemplate=esignet/OidcClient/OIDCClientResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create OIDC client NonAuth all valid details, uniqueIdentifier=TC_ESignet_CreateOIDCClient_02, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:203)
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:93)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| Esignet_CreateOIDCClient_all_ForJWSUpdatedToJWEInfo_Valid_Smoke_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Esignet_CreateOIDCClient_all_ForJWSUpdatedToJWEInfo_Valid_Smoke_sid, endPoint=/v1/partnermanager/oidc/client, role=partner, templateFields=null, input={ "name": "$RANDOMID$", "policyId": "$ID:DefinePolicy_All_Valid_Smoke_sid_id$", "publicKey": "$OIDCJWKKEY6$", "authPartnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "logoUri": "https://health-services.com/logo.png", "redirectUris": "$IDPREDIRECTURI$", "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt" }, output={ "status": "ACTIVE" }, inputTemplate=esignet/OidcClient/OIDCClient, outputTemplate=esignet/OidcClient/OIDCClientResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create OIDC client with all valid details for userinfo, uniqueIdentifier=TC_ESignet_CreateOIDCClient_24, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:203)
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:93)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| Esignet_CreateOIDCClient_all_Valid_Smoke_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Esignet_CreateOIDCClient_all_Valid_Smoke_sid, endPoint=/v1/partnermanager/oidc/client, role=partner, templateFields=null, input={ "name": "$RANDOMID$", "policyId": "$ID:DefinePolicy_All_Valid_Smoke_sid_id$", "publicKey": "$OIDCJWKKEY$", "authPartnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "logoUri": "https://health-services.com/logo.png", "redirectUris": "$IDPREDIRECTURI$", "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt" }, output={ "status": "ACTIVE" }, inputTemplate=esignet/OidcClient/OIDCClient, outputTemplate=esignet/OidcClient/OIDCClientResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create OIDC client with all valid details, uniqueIdentifier=TC_ESignet_CreateOIDCClient_01, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:203)
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:93)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| Esignet_CreateOIDCClient_all_forUserInfoJWE_Valid_Smoke_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Esignet_CreateOIDCClient_all_forUserInfoJWE_Valid_Smoke_sid, endPoint=/v1/partnermanager/oidc/client, role=partner, templateFields=null, input={ "name": "$RANDOMID$", "policyId": "$ID:DefinePolicy_All_Valid_Smoke_sid_id$", "publicKey": "$OIDCJWKKEY4$", "authPartnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "logoUri": "https://health-services.com/logo.png", "redirectUris": "$IDPREDIRECTURI$", "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt" }, output={ "status": "ACTIVE" }, inputTemplate=esignet/OidcClient/OIDCClient, outputTemplate=esignet/OidcClient/OIDCClientResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create OIDC client with all valid details for userinfo, uniqueIdentifier=TC_ESignet_CreateOIDCClient_23, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:203)
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:93)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| Esignet_CreateOIDCClient_all_forUserInfoJWS_Valid_Smoke_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Esignet_CreateOIDCClient_all_forUserInfoJWS_Valid_Smoke_sid, endPoint=/v1/partnermanager/oidc/client, role=partner, templateFields=null, input={ "name": "$RANDOMID$", "policyId": "$ID:DefinePolicy_All_Valid_Smoke_sid_id$", "publicKey": "$OIDCJWKKEY7$", "authPartnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "logoUri": "https://health-services.com/logo.png", "redirectUris": "$IDPREDIRECTURI$", "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt" }, output={ "status": "ACTIVE" }, inputTemplate=esignet/OidcClient/OIDCClient, outputTemplate=esignet/OidcClient/OIDCClientResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create OIDC client with all valid details for userinfo, uniqueIdentifier=TC_ESignet_CreateOIDCClient_22, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:203)
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:93)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| Esignet_CreateOIDCClient_blank_authPartnerId_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Esignet_CreateOIDCClient_blank_authPartnerId_sid, endPoint=/v1/partnermanager/oidc/client, role=partner, templateFields=null, input={ "name": "$RANDOMID$", "policyId": "$ID:DefinePolicy_All_Valid_Smoke_sid_id$", "publicKey": "$OIDCJWKKEY2$", "authPartnerId": "263636gdgdg", "logoUri": "https://health-services.com/logo.png", "redirectUris": "$IDPREDIRECTURI$", "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt" }, output={ "errors": [ { "errorCode": "PMS_PRT_058", "message": "Partner policy mapping not exists." } ] }, inputTemplate=esignet/OidcClient/OIDCClient, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create OIDC client blank authpartnerId, uniqueIdentifier=TC_ESignet_CreateOIDCClient_13, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:203)
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:93)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| Esignet_CreateOIDCClient_inValid_authPartnerId_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Esignet_CreateOIDCClient_inValid_authPartnerId_sid, endPoint=/v1/partnermanager/oidc/client, role=partner, templateFields=null, input={ "name": "$RANDOMID$", "policyId": "$ID:DefinePolicy_All_Valid_Smoke_sid_id$", "publicKey": "$OIDCJWKKEY2$", "authPartnerId": "263636gdgdg", "logoUri": "https://health-services.com/logo.png", "redirectUris": "$IDPREDIRECTURI$", "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt" }, output={ "errors": [ { "errorCode": "PMS_PRT_058", "message": "Partner policy mapping not exists." } ] }, inputTemplate=esignet/OidcClient/OIDCClient, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create OIDC client with invalid authpartnerId, uniqueIdentifier=TC_ESignet_CreateOIDCClient_12, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:203)
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:93)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| Esignet_CreateOIDCClient_max_authPartnerId_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Esignet_CreateOIDCClient_max_authPartnerId_Neg, endPoint=/v1/partnermanager/oidc/client, role=partner, templateFields=null, input={ "name": "$RANDOMID$", "policyId": "$ID:DefinePolicy_All_Valid_Smoke_sid_id$", "publicKey": "$OIDCJWKKEY2$", "authPartnerId": "17777777777777777777777777hhhhhhhhhhhhhhhh7222222222222222222222hdddddd", "logoUri": "https://health-services.com/logo.png", "redirectUris": "$IDPREDIRECTURI$", "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt" }, output={ "errors": [ { "errorCode": "PMS_PRT_058" } ] }, inputTemplate=esignet/OidcClient/OIDCClient, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create OIDC client with exceeding maximum limit in authpartnerId, uniqueIdentifier=TC_ESignet_CreateOIDCClient_21, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:203)
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:93)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| Esignet_CreateOIDCClient_same_publickey_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Esignet_CreateOIDCClient_same_publickey_sid, endPoint=/v1/partnermanager/oidc/client, role=partner, templateFields=null, input={ "name": "$RANDOMID$", "policyId": "$ID:DefinePolicy_All_Valid_Smoke_sid_id$", "publicKey": "$OIDCJWKKEY$", "authPartnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "logoUri": "https://health-services.com/logo.png", "redirectUris": "$IDPREDIRECTURI$", "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt" }, output={ "errors": [ { "errorCode": "PMS_IDP_001", "message": "Client public key already exists." } ] }, inputTemplate=esignet/OidcClient/OIDCClient, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=PMS_IDP_001,PMS_ESI_001, kycFields=null, description=Create OIDC client with same publicKey, uniqueIdentifier=TC_ESignet_CreateOIDCClient_20, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:203)
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:93)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| Esignet_CreateOIDCClient_with_empty_grantTypes_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Esignet_CreateOIDCClient_with_empty_grantTypes_sid, endPoint=/v1/partnermanager/oidc/client, role=partner, templateFields=null, input={ "name": "$RANDOMID$", "policyId": "$ID:DefinePolicy_All_Valid_Smoke_sid_id$", "publicKey": "$OIDCJWKKEY2$", "authPartnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "logoUri": "https://health-services.com/logo.png", "redirectUris": "$IDPREDIRECTURI$", "grantTypes": "", "clientAuthMethods": "private_key_jwt" }, output={ "errors": [ { "errorCode": "unsupported_grant_type" } ] }, inputTemplate=esignet/OidcClient/OIDCClient, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create OIDC client with empty grantTypes, uniqueIdentifier=TC_ESignet_CreateOIDCClient_17, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:203)
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:93)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| Esignet_CreateOIDCClient_with_invalid_clientAuthMethods_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Esignet_CreateOIDCClient_with_invalid_clientAuthMethods_sid, endPoint=/v1/partnermanager/oidc/client, role=partner, templateFields=null, input={ "name": "$RANDOMID$", "policyId": "$ID:DefinePolicy_All_Valid_Smoke_sid_id$", "publicKey": "$OIDCJWKKEY2$", "authPartnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "logoUri": "https://health-services.com/logo.png", "redirectUris": "$IDPREDIRECTURI$", "grantTypes": "authorization_code", "clientAuthMethods": "????%%%$$$" }, output={ "errors": [ { "errorCode": "invalid_client_auth" } ] }, inputTemplate=esignet/OidcClient/OIDCClient, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create OIDC client with invalid clientAuthMethods, uniqueIdentifier=TC_ESignet_CreateOIDCClient_16, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:203)
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:93)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| Esignet_CreateOIDCClient_with_invalid_grantTypes_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Esignet_CreateOIDCClient_with_invalid_grantTypes_sid, endPoint=/v1/partnermanager/oidc/client, role=partner, templateFields=null, input={ "name": "$RANDOMID$", "policyId": "$ID:DefinePolicy_All_Valid_Smoke_sid_id$", "publicKey": "$OIDCJWKKEY2$", "authPartnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "logoUri": "https://health-services.com/logo.png", "redirectUris": "$IDPREDIRECTURI$", "grantTypes": "ahshdbdbchhd", "clientAuthMethods": "private_key_jwt" }, output={ "errors": [ { "errorCode": "unsupported_grant_type" } ] }, inputTemplate=esignet/OidcClient/OIDCClient, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create OIDC client with invalid grantTypes, uniqueIdentifier=TC_ESignet_CreateOIDCClient_19, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:203)
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:93)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| Esignet_CreateOIDCClient_with_invalid_policy_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Esignet_CreateOIDCClient_with_invalid_policy_sid, endPoint=/v1/partnermanager/oidc/client, role=partner, templateFields=null, input={ "name": "$RANDOMID$", "policyId": "ahajajaj123", "publicKey": "$OIDCJWKKEY2$", "authPartnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "logoUri": "https://health-services.com/logo.png", "redirectUris": "$IDPREDIRECTURI$", "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt" }, output={ "errors": [ { "errorCode": "PMS_PRT_073", "message": "Policy not exists." } ] }, inputTemplate=esignet/OidcClient/OIDCClient, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create OIDC client with invalid policy, uniqueIdentifier=TC_ESignet_CreateOIDCClient_11, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:203)
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:93)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| Esignet_CreateOIDCClient_with_maxm_char_logouri_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Esignet_CreateOIDCClient_with_maxm_char_logouri_sid, endPoint=/v1/partnermanager/oidc/client, role=partner, templateFields=null, input={ "name": "$RANDOMID$", "policyId": "$ID:DefinePolicy_All_Valid_Smoke_sid_id$", "publicKey": "$OIDCJWKKEY2$", "authPartnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "logoUri": "dgdnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnndddddddhhhhhhhhhhhhhhhhhhhhhhhhhhhhhheeeeeehhhhhhhhhhyyyyy", "redirectUris": "$IDPREDIRECTURI$", "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt" }, output={ "errors": [ { "errorCode": "PMS_COR_001", "message": "Invalid request parameter - must be a valid URL :request.logoUri" } ] }, inputTemplate=esignet/OidcClient/OIDCClient, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create OIDC client with maximum character in logouri, uniqueIdentifier=TC_ESignet_CreateOIDCClient_14, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:203)
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:93)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| Esignet_CreateOIDCClient_with_null_grantTypes_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Esignet_CreateOIDCClient_with_null_grantTypes_sid, endPoint=/v1/partnermanager/oidc/client, role=partner, templateFields=null, input={ "name": "$RANDOMID$", "policyId": "$ID:DefinePolicy_All_Valid_Smoke_sid_id$", "publicKey": "$OIDCJWKKEY2$", "authPartnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "logoUri": "https://health-services.com/logo.png", "redirectUris": "$IDPREDIRECTURI$", "grantTypes": "null", "clientAuthMethods": "private_key_jwt" }, output={ "errors": [ { "errorCode": "unsupported_grant_type" } ] }, inputTemplate=esignet/OidcClient/OIDCClient, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create OIDC client with null grantTypes, uniqueIdentifier=TC_ESignet_CreateOIDCClient_18, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:203)
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:93)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| Esignet_CreateOIDCClient_with_null_oidc_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Esignet_CreateOIDCClient_with_null_oidc_sid, endPoint=/v1/partnermanager/oidc/client, role=partner, templateFields=null, input={ "name": "", "policyId": "$ID:DefinePolicy_All_Valid_Smoke_sid_id$", "publicKey": "$OIDCJWKKEY2$", "authPartnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "logoUri": "https://health-services.com/logo.png", "redirectUris": "$IDPREDIRECTURI$", "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt" }, output={ "errors": [ { "errorCode": "PMS_COR_001", "message": "Invalid request parameter - must not be blank :request.name" } ] }, inputTemplate=esignet/OidcClient/OIDCClient, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create OIDC client with null oidc, uniqueIdentifier=TC_ESignet_CreateOIDCClient_09, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:203)
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:93)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| Esignet_CreateOIDCClient_with_null_policy_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Esignet_CreateOIDCClient_with_null_policy_sid, endPoint=/v1/partnermanager/oidc/client, role=partner, templateFields=null, input={ "name": "$RANDOMID$", "policyId": "", "publicKey": "$OIDCJWKKEY2$", "authPartnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "logoUri": "https://health-services.com/logo.png", "redirectUris": "$IDPREDIRECTURI$", "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt" }, output={ "errors": [ { "errorCode": "PMS_COR_001", "message": "Invalid request parameter - must not be blank :request.policyId" } ] }, inputTemplate=esignet/OidcClient/OIDCClient, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create OIDC client with null policy, uniqueIdentifier=TC_ESignet_CreateOIDCClient_10, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:203)
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:93)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| Esignet_CreateOIDCClient_without_redirecturi_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Esignet_CreateOIDCClient_without_redirecturi_sid, endPoint=/v1/partnermanager/oidc/client, role=partner, templateFields=null, input={ "name": "$RANDOMID$", "policyId": "$ID:DefinePolicy_All_Valid_Smoke_sid_id$", "publicKey": "$OIDCJWKKEY2$", "authPartnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "logoUri": "https://health-services.com/logo.png", "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt" }, output={ "errors": [ { "errorCode": "invalid_redirect_uri" } ] }, inputTemplate=esignet/OidcClient/OIDCClient, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create OIDC client without redirecturi, uniqueIdentifier=TC_ESignet_CreateOIDCClient_15, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:203)
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:93)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| Esignet_DPoPCreateOIDCClientV3_all_Valid_Smoke_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Esignet_DPoPCreateOIDCClientV3_all_Valid_Smoke_sid, endPoint=/v1/partnermanager/oidc/client, role=partner, templateFields=null, input={ "name": "$RANDOMID$", "policyId": "$ID:DefinePolicy_All_Valid_Smoke_sid_id$", "publicKey": "$OIDC_JWK_KEY_DPoP$", "authPartnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "logoUri": "https://health-services.com/logo.png", "redirectUris": "$IDPREDIRECTURI$", "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt", "dpop_bound_access_tokens": true }, output={ "status": "ACTIVE" }, inputTemplate=esignet/OidcClient/OIDCClientDPOP, outputTemplate=esignet/OidcClient/OIDCClientResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create OIDC client with all valid details for MOSIP ID DPOP flow, uniqueIdentifier=TC_ESignet_CreateOIDCClient_26, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:203)
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:93)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| Esignet_OIDCClientV3_VerifiedClaims_all_Valid_Smoke_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Esignet_OIDCClientV3_VerifiedClaims_all_Valid_Smoke_sid, endPoint=/v1/partnermanager/oidc/client, role=partner, templateFields=null, input={ "name": "$RANDOMID$", "policyId": "$ID:DefinePolicy_All_Valid_Smoke_sid_id$", "publicKey": "$OIDCJWKKEY10$", "authPartnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "logoUri": "https://health-services.com/logo.png", "redirectUris": "$IDPREDIRECTURI$", "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt" }, output={ "status": "ACTIVE" }, inputTemplate=esignet/OidcClient/OIDCClient, outputTemplate=esignet/OidcClient/OIDCClientResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create OIDC client with all valid details for verified claims, uniqueIdentifier=TC_ESignet_CreateOIDCClient_27, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:203)
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:93)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| Esignet_OIDCClientV3_WithoutVerifiedClaims_all_Valid_Smoke_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Esignet_OIDCClientV3_WithoutVerifiedClaims_all_Valid_Smoke_sid, endPoint=/v1/partnermanager/oidc/client, role=partner, templateFields=null, input={ "name": "$RANDOMID$", "policyId": "$ID:DefinePolicy_All_Valid_Smoke_sid_id$", "publicKey": "$OIDCJWKKEY11$", "authPartnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "logoUri": "https://health-services.com/logo.png", "redirectUris": "$IDPREDIRECTURI$", "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt" }, output={ "status": "ACTIVE" }, inputTemplate=esignet/OidcClient/OIDCClient, outputTemplate=esignet/OidcClient/OIDCClientResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create OIDC client with all valid details for without verified claims, uniqueIdentifier=TC_ESignet_CreateOIDCClient_28, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:203)
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:93)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| Esignet_UpdateOIDC_Invalid_clientId_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PutWithPathParamsAndBody |
| Testcase Input |
| testCaseName=Esignet_UpdateOIDC_Invalid_clientId_Neg, endPoint=/v1/partnermanager/oidc/client/{clientId}, role=partner, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "logoUri": "https://health-services.com/logo.png", "redirectUris": "$IDPREDIRECTURI$", "status": "ACTIVE", "grantTypes": "authorization_code", "clientName": "MOSIP OIDC Client", "clientId": "$DFDFF@#$", "clientAuthMethods": "private_key_jwt" }, output={ "errors": [ { "errorCode": "PMS_IDP_004" } ] }, inputTemplate=esignet/UpdateOIDC/UpdateOIDC, outputTemplate=esignet/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=PMS_IDP_004,PMS_ESI_004, kycFields=null, description=Update OIDC client with invalid clientId, uniqueIdentifier=null, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:203)
at io.mosip.testrig.apirig.esignet.testscripts.PutWithPathParamsAndBody.test(PutWithPathParamsAndBody.java:86)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| Esignet_UpdateOIDC_all_Valid_Smoke |
| Testcase Dependency |
| [] |
| Class Name |
| PutWithPathParamsAndBody |
| Testcase Input |
| testCaseName=Esignet_UpdateOIDC_all_Valid_Smoke, endPoint=/v1/partnermanager/oidc/client/{clientId}, role=partner, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "logoUri": "https://health-services.com/logo.png", "redirectUris": "$IDPREDIRECTURI$", "status": "ACTIVE", "grantTypes": "authorization_code", "clientName": "MOSIP OIDC Client", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "clientAuthMethods": "private_key_jwt" }, output={ "status": "ACTIVE" }, inputTemplate=esignet/UpdateOIDC/UpdateOIDC, outputTemplate=esignet/UpdateOIDC/UpdateOIDCResult, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Update OIDC client with all valid details, uniqueIdentifier=null, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:203)
at io.mosip.testrig.apirig.esignet.testscripts.PutWithPathParamsAndBody.test(PutWithPathParamsAndBody.java:86)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| Esignet_GetOidcClient_Invalid_clientId_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Esignet_GetOidcClient_Invalid_clientId_Neg, endPoint=/v1/partnermanager/oidc/client/{client_id}, role=resident, templateFields=null, input={ "client_id": "$sjdh@#$" }, output={ "errors": [ { "errorCode": "PMS_IDP_004" } ] }, inputTemplate=esignet/GetOidcClient/GetOidcClient, outputTemplate=esignet/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=PMS_IDP_004,PMS_ESI_004, kycFields=null, description=Get OIDC client with invalid clientId, uniqueIdentifier=TC_ESignet_GetOidcClient_02, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:203)
at io.mosip.testrig.apirig.esignet.testscripts.GetWithParam.test(GetWithParam.java:87)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| Esignet_GetOidcClient_all_Valid_Smoke |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Esignet_GetOidcClient_all_Valid_Smoke, endPoint=/v1/partnermanager/oidc/client/{client_id}, role=resident, templateFields=null, input={ "client_id": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$" }, output={ }, inputTemplate=esignet/GetOidcClient/GetOidcClient, outputTemplate=esignet/GetOidcClient/GetOidcClientResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Get OIDC client with all valid details, uniqueIdentifier=TC_ESignet_GetOidcClient_01, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:203)
at io.mosip.testrig.apirig.esignet.testscripts.GetWithParam.test(GetWithParam.java:87)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignetRes_Generate_Onetimeuse2_VID_Valid_Smoke_sid |
| Testcase Dependency |
| [] |
| Class Name |
| PostWithAutogenIdWithOtpGenerate |
| Testcase Input |
| testCaseName=ESignetRes_Generate_Onetimeuse2_VID_Valid_Smoke_sid, endPoint=/resident/v1/vid, role=resident, templateFields=null, input={ "transactionID": "$TRANSACTIONID$", "individualId": "$ID:AddIdentity_Vid_2_Generation_smoke_Pos_UIN$", "individualIdType": "UIN", "requesttime": "$TIMESTAMP$", "id": "mosip.resident.vid", "version": "v1", "vidType": "onetimeuse", "otp": "$ID:AddIdentity_Vid_2_Generation_smoke_Pos_EMAIL$", "sendOtp":{ "transactionID": "$TRANSACTIONID$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Vid_2_Generation_smoke_Pos_UIN$", "individualIdType": "UIN", "sendOtpReqTemplate": "esignet/SendOTPRes/createSendOTP", "sendOtpEndPoint": "/resident/v1/req/otp" } }, output={ "sendOtpResp":{ "sendOtpResTemplate":"esignet/SendOTPRes/createSendOTPResult" } }, inputTemplate=esignet/GenerateVID/createGenerateVID, outputTemplate=esignet/GenerateVID/createGenerateVIDResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generate Onetimeuse2 VID valid details, uniqueIdentifier=Dependent_Idrepo_GenerateVID_06, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:203)
at io.mosip.testrig.apirig.esignet.testscripts.PostWithAutogenIdWithOtpGenerate.test(PostWithAutogenIdWithOtpGenerate.java:89)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignetRes_Generate_Onetimeuse_VID_Invalid_Scen_Valid_Smoke_sid |
| Testcase Dependency |
| [] |
| Class Name |
| PostWithAutogenIdWithOtpGenerate |
| Testcase Input |
| testCaseName=ESignetRes_Generate_Onetimeuse_VID_Invalid_Scen_Valid_Smoke_sid, endPoint=/resident/v1/vid, role=resident, templateFields=null, input={ "transactionID": "$TRANSACTIONID$", "individualId": "$ID:AddIdentity_Invalid_Scen_smoke_Pos_UIN$", "individualIdType": "UIN", "requesttime": "$TIMESTAMP$", "id": "mosip.resident.vid", "version": "v1", "vidType": "onetimeuse", "otp": "$ID:AddIdentity_Invalid_Scen_smoke_Pos_EMAIL$", "sendOtp":{ "transactionID": "$TRANSACTIONID$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Invalid_Scen_smoke_Pos_UIN$", "individualIdType": "UIN", "sendOtpReqTemplate": "esignet/SendOTPRes/createSendOTP", "sendOtpEndPoint": "/resident/v1/req/otp" } }, output={ "sendOtpResp":{ "sendOtpResTemplate":"esignet/SendOTPRes/createSendOTPResult" } }, inputTemplate=esignet/GenerateVID/createGenerateVID, outputTemplate=esignet/GenerateVID/createGenerateVIDResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generate Onetimeuse VID invalid scen valid details, uniqueIdentifier=Dependent_Idrepo_GenerateVID_11, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:203)
at io.mosip.testrig.apirig.esignet.testscripts.PostWithAutogenIdWithOtpGenerate.test(PostWithAutogenIdWithOtpGenerate.java:89)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignetRes_Generate_Onetimeuse_VID_Valid_Smoke_sid |
| Testcase Dependency |
| [] |
| Class Name |
| PostWithAutogenIdWithOtpGenerate |
| Testcase Input |
| testCaseName=ESignetRes_Generate_Onetimeuse_VID_Valid_Smoke_sid, endPoint=/resident/v1/vid, role=resident, templateFields=null, input={ "transactionID": "$TRANSACTIONID$", "individualId": "$ID:AddIdentity_Vid_Generation_smoke_Pos_UIN$", "individualIdType": "UIN", "requesttime": "$TIMESTAMP$", "id": "mosip.resident.vid", "version": "v1", "vidType": "onetimeuse", "otp": "$ID:AddIdentity_Vid_Generation_smoke_Pos_EMAIL$", "sendOtp":{ "transactionID": "$TRANSACTIONID$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Vid_Generation_smoke_Pos_UIN$", "individualIdType": "UIN", "sendOtpReqTemplate": "esignet/SendOTPRes/createSendOTP", "sendOtpEndPoint": "/resident/v1/req/otp" } }, output={ "sendOtpResp":{ "sendOtpResTemplate":"esignet/SendOTPRes/createSendOTPResult" } }, inputTemplate=esignet/GenerateVID/createGenerateVID, outputTemplate=esignet/GenerateVID/createGenerateVIDResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generate Onetimeuse VID with valid details, uniqueIdentifier=Dependent_Idrepo_GenerateVID_03, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:203)
at io.mosip.testrig.apirig.esignet.testscripts.PostWithAutogenIdWithOtpGenerate.test(PostWithAutogenIdWithOtpGenerate.java:89)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignetRes_Generate_Perpetual2_VID_Valid_Smoke_sid |
| Testcase Dependency |
| [] |
| Class Name |
| PostWithAutogenIdWithOtpGenerate |
| Testcase Input |
| testCaseName=ESignetRes_Generate_Perpetual2_VID_Valid_Smoke_sid, endPoint=/resident/v1/vid, role=resident, templateFields=null, input={ "transactionID": "$TRANSACTIONID$", "individualId": "$ID:AddIdentity_Vid_2_Generation_smoke_Pos_UIN$", "individualIdType": "UIN", "requesttime": "$TIMESTAMP$", "id": "mosip.resident.vid", "version": "v1", "vidType": "Perpetual", "otp": "$ID:AddIdentity_Vid_2_Generation_smoke_Pos_EMAIL$", "sendOtp":{ "transactionID": "$TRANSACTIONID$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Vid_2_Generation_smoke_Pos_UIN$", "individualIdType": "UIN", "sendOtpReqTemplate": "esignet/SendOTPRes/createSendOTP", "sendOtpEndPoint": "/resident/v1/req/otp" } }, output={ "sendOtpResp":{ "sendOtpResTemplate":"esignet/SendOTPRes/createSendOTPResult" } }, inputTemplate=esignet/GenerateVID/createGenerateVID, outputTemplate=esignet/GenerateVID/createGenerateVIDResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generate perpetual2 VID with valid details, uniqueIdentifier=Dependent_Idrepo_GenerateVID_04, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:203)
at io.mosip.testrig.apirig.esignet.testscripts.PostWithAutogenIdWithOtpGenerate.test(PostWithAutogenIdWithOtpGenerate.java:89)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignetRes_Generate_Perpetual_VID_Consent_Valid_Smoke_sid |
| Testcase Dependency |
| [] |
| Class Name |
| PostWithAutogenIdWithOtpGenerate |
| Testcase Input |
| testCaseName=ESignetRes_Generate_Perpetual_VID_Consent_Valid_Smoke_sid, endPoint=/resident/v1/vid, role=resident, templateFields=null, input={ "transactionID": "$TRANSACTIONID$", "individualId": "$ID:AddIdentity_Consent_Vid_smoke_Pos_UIN$", "individualIdType": "UIN", "requesttime": "$TIMESTAMP$", "id": "mosip.resident.vid", "version": "v1", "vidType": "Perpetual", "otp": "$ID:AddIdentity_Consent_Vid_smoke_Pos_EMAIL$", "sendOtp":{ "transactionID": "$TRANSACTIONID$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Consent_Vid_smoke_Pos_UIN$", "individualIdType": "UIN", "sendOtpReqTemplate": "esignet/SendOTPRes/createSendOTP", "sendOtpEndPoint": "/resident/v1/req/otp" } }, output={ "sendOtpResp":{ "sendOtpResTemplate":"esignet/SendOTPRes/createSendOTPResult" } }, inputTemplate=esignet/GenerateVID/createGenerateVID, outputTemplate=esignet/GenerateVID/createGenerateVIDResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generate perpetual VID consent valid details, uniqueIdentifier=Dependent_Idrepo_GenerateVID_12, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:203)
at io.mosip.testrig.apirig.esignet.testscripts.PostWithAutogenIdWithOtpGenerate.test(PostWithAutogenIdWithOtpGenerate.java:89)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignetRes_Generate_Perpetual_VID_Invalid_Scen_Valid_Smoke_sid |
| Testcase Dependency |
| [] |
| Class Name |
| PostWithAutogenIdWithOtpGenerate |
| Testcase Input |
| testCaseName=ESignetRes_Generate_Perpetual_VID_Invalid_Scen_Valid_Smoke_sid, endPoint=/resident/v1/vid, role=resident, templateFields=null, input={ "transactionID": "$TRANSACTIONID$", "individualId": "$ID:AddIdentity_Invalid_Scen_smoke_Pos_UIN$", "individualIdType": "UIN", "requesttime": "$TIMESTAMP$", "id": "mosip.resident.vid", "version": "v1", "vidType": "Perpetual", "otp": "$ID:AddIdentity_Invalid_Scen_smoke_Pos_EMAIL$", "sendOtp":{ "transactionID": "$TRANSACTIONID$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Invalid_Scen_smoke_Pos_UIN$", "individualIdType": "UIN", "sendOtpReqTemplate": "esignet/SendOTPRes/createSendOTP", "sendOtpEndPoint": "/resident/v1/req/otp" } }, output={ "sendOtpResp":{ "sendOtpResTemplate":"esignet/SendOTPRes/createSendOTPResult" } }, inputTemplate=esignet/GenerateVID/createGenerateVID, outputTemplate=esignet/GenerateVID/createGenerateVIDResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generate perpetual VID with invalid scenario, uniqueIdentifier=Dependent_Idrepo_GenerateVID_09, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:203)
at io.mosip.testrig.apirig.esignet.testscripts.PostWithAutogenIdWithOtpGenerate.test(PostWithAutogenIdWithOtpGenerate.java:89)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignetRes_Generate_Perpetual_VID_Kyc_Valid_Smoke_sid |
| Testcase Dependency |
| [] |
| Class Name |
| PostWithAutogenIdWithOtpGenerate |
| Testcase Input |
| testCaseName=ESignetRes_Generate_Perpetual_VID_Kyc_Valid_Smoke_sid, endPoint=/resident/v1/vid, role=resident, templateFields=null, input={ "transactionID": "$TRANSACTIONID$", "individualId": "$ID:AddIdentity_KycAuth_smoke_Pos_UIN$", "individualIdType": "UIN", "requesttime": "$TIMESTAMP$", "id": "mosip.resident.vid", "version": "v1", "vidType": "Perpetual", "otp": "$ID:AddIdentity_KycAuth_smoke_Pos_EMAIL$", "sendOtp":{ "transactionID": "$TRANSACTIONID$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_KycAuth_smoke_Pos_UIN$", "individualIdType": "UIN", "sendOtpReqTemplate": "esignet/SendOTPRes/createSendOTP", "sendOtpEndPoint": "/resident/v1/req/otp" } }, output={ "sendOtpResp":{ "sendOtpResTemplate":"esignet/SendOTPRes/createSendOTPResult" } }, inputTemplate=esignet/GenerateVID/createGenerateVID, outputTemplate=esignet/GenerateVID/createGenerateVIDResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generate perpetual VID Kyc valid details, uniqueIdentifier=Dependent_Idrepo_GenerateVID_07, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:203)
at io.mosip.testrig.apirig.esignet.testscripts.PostWithAutogenIdWithOtpGenerate.test(PostWithAutogenIdWithOtpGenerate.java:89)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignetRes_Generate_Perpetual_VID_LinkedSce_Valid_Smoke_sid |
| Testcase Dependency |
| [] |
| Class Name |
| PostWithAutogenIdWithOtpGenerate |
| Testcase Input |
| testCaseName=ESignetRes_Generate_Perpetual_VID_LinkedSce_Valid_Smoke_sid, endPoint=/resident/v1/vid, role=resident, templateFields=null, input={ "transactionID": "$TRANSACTIONID$", "individualId": "$ID:AddIdentity_Linked_Sce_smoke_Pos_UIN$", "individualIdType": "UIN", "requesttime": "$TIMESTAMP$", "id": "mosip.resident.vid", "version": "v1", "vidType": "Perpetual", "otp": "$ID:AddIdentity_Linked_Sce_smoke_Pos_EMAIL$", "sendOtp":{ "transactionID": "$TRANSACTIONID$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Linked_Sce_smoke_Pos_UIN$", "individualIdType": "UIN", "sendOtpReqTemplate": "esignet/SendOTPRes/createSendOTP", "sendOtpEndPoint": "/resident/v1/req/otp" } }, output={ "sendOtpResp":{ "sendOtpResTemplate":"esignet/SendOTPRes/createSendOTPResult" } }, inputTemplate=esignet/GenerateVID/createGenerateVID, outputTemplate=esignet/GenerateVID/createGenerateVIDResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generate perpetual VID Linkedsce valid details, uniqueIdentifier=Dependent_Idrepo_GenerateVID_08, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:203)
at io.mosip.testrig.apirig.esignet.testscripts.PostWithAutogenIdWithOtpGenerate.test(PostWithAutogenIdWithOtpGenerate.java:89)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignetRes_Generate_Perpetual_VID_Linked_Consent_User2_Valid_Smoke_sid |
| Testcase Dependency |
| [] |
| Class Name |
| PostWithAutogenIdWithOtpGenerate |
| Testcase Input |
| testCaseName=ESignetRes_Generate_Perpetual_VID_Linked_Consent_User2_Valid_Smoke_sid, endPoint=/resident/v1/vid, role=resident, templateFields=null, input={ "transactionID": "$TRANSACTIONID$", "individualId": "$ID:AddIdentity_Linked_Consent_User2_Vid_smoke_Pos_UIN$", "individualIdType": "UIN", "requesttime": "$TIMESTAMP$", "id": "mosip.resident.vid", "version": "v1", "vidType": "Perpetual", "otp": "$ID:AddIdentity_Linked_Consent_User2_Vid_smoke_Pos_EMAIL$", "sendOtp":{ "transactionID": "$TRANSACTIONID$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Linked_Consent_User2_Vid_smoke_Pos_UIN$", "individualIdType": "UIN", "sendOtpReqTemplate": "esignet/SendOTPRes/createSendOTP", "sendOtpEndPoint": "/resident/v1/req/otp" } }, output={ "sendOtpResp":{ "sendOtpResTemplate":"esignet/SendOTPRes/createSendOTPResult" } }, inputTemplate=esignet/GenerateVID/createGenerateVID, outputTemplate=esignet/GenerateVID/createGenerateVIDResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generate perpetual VID linked consent user2 valid details, uniqueIdentifier=Dependent_Idrepo_GenerateVID_14, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:203)
at io.mosip.testrig.apirig.esignet.testscripts.PostWithAutogenIdWithOtpGenerate.test(PostWithAutogenIdWithOtpGenerate.java:89)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignetRes_Generate_Perpetual_VID_Linked_Consent_Valid_Smoke_sid |
| Testcase Dependency |
| [] |
| Class Name |
| PostWithAutogenIdWithOtpGenerate |
| Testcase Input |
| testCaseName=ESignetRes_Generate_Perpetual_VID_Linked_Consent_Valid_Smoke_sid, endPoint=/resident/v1/vid, role=resident, templateFields=null, input={ "transactionID": "$TRANSACTIONID$", "individualId": "$ID:AddIdentity_Linked_Consent_Vid_smoke_Pos_UIN$", "individualIdType": "UIN", "requesttime": "$TIMESTAMP$", "id": "mosip.resident.vid", "version": "v1", "vidType": "Perpetual", "otp": "$ID:AddIdentity_Linked_Consent_Vid_smoke_Pos_EMAIL$", "sendOtp":{ "transactionID": "$TRANSACTIONID$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Linked_Consent_Vid_smoke_Pos_UIN$", "individualIdType": "UIN", "sendOtpReqTemplate": "esignet/SendOTPRes/createSendOTP", "sendOtpEndPoint": "/resident/v1/req/otp" } }, output={ "sendOtpResp":{ "sendOtpResTemplate":"esignet/SendOTPRes/createSendOTPResult" } }, inputTemplate=esignet/GenerateVID/createGenerateVID, outputTemplate=esignet/GenerateVID/createGenerateVIDResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generate perpetual VID linked consent valid details, uniqueIdentifier=Dependent_Idrepo_GenerateVID_13, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:203)
at io.mosip.testrig.apirig.esignet.testscripts.PostWithAutogenIdWithOtpGenerate.test(PostWithAutogenIdWithOtpGenerate.java:89)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignetRes_Generate_Perpetual_VID_VCI_Invalid_Scen_Smoke_sid |
| Testcase Dependency |
| [] |
| Class Name |
| PostWithAutogenIdWithOtpGenerate |
| Testcase Input |
| testCaseName=ESignetRes_Generate_Perpetual_VID_VCI_Invalid_Scen_Smoke_sid, endPoint=/resident/v1/vid, role=resident, templateFields=null, input={ "transactionID": "$TRANSACTIONID$", "individualId": "$ID:AddIdentity_Valid_Params_VCI_Vid_Inv_Scen_smoke_Pos_UIN$", "individualIdType": "UIN", "requesttime": "$TIMESTAMP$", "id": "mosip.resident.vid", "version": "v1", "vidType": "Perpetual", "otp": "$ID:AddIdentity_Valid_Params_VCI_Vid_Inv_Scen_smoke_Pos_EMAIL$", "sendOtp":{ "transactionID": "$TRANSACTIONID$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Valid_Params_VCI_Vid_Inv_Scen_smoke_Pos_UIN$", "individualIdType": "UIN", "sendOtpReqTemplate": "esignet/SendOTPRes/createSendOTP", "sendOtpEndPoint": "/resident/v1/req/otp" } }, output={ "sendOtpResp":{ "sendOtpResTemplate":"esignet/SendOTPRes/createSendOTPResult" } }, inputTemplate=esignet/GenerateVID/createGenerateVID, outputTemplate=esignet/GenerateVID/createGenerateVIDResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generate perpetual VID VCI with invalid scenario, uniqueIdentifier=Dependent_Idrepo_GenerateVID_16, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:203)
at io.mosip.testrig.apirig.esignet.testscripts.PostWithAutogenIdWithOtpGenerate.test(PostWithAutogenIdWithOtpGenerate.java:89)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignetRes_Generate_Perpetual_VID_VCI_Valid_Smoke_sid |
| Testcase Dependency |
| [] |
| Class Name |
| PostWithAutogenIdWithOtpGenerate |
| Testcase Input |
| testCaseName=ESignetRes_Generate_Perpetual_VID_VCI_Valid_Smoke_sid, endPoint=/resident/v1/vid, role=resident, templateFields=null, input={ "transactionID": "$TRANSACTIONID$", "individualId": "$ID:AddIdentity_Valid_Params_VCI_uin_smoke_Pos_UIN$", "individualIdType": "UIN", "requesttime": "$TIMESTAMP$", "id": "mosip.resident.vid", "version": "v1", "vidType": "Perpetual", "otp": "$ID:AddIdentity_Valid_Params_VCI_uin_smoke_Pos_EMAIL$", "sendOtp":{ "transactionID": "$TRANSACTIONID$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Valid_Params_VCI_uin_smoke_Pos_UIN$", "individualIdType": "UIN", "sendOtpReqTemplate": "esignet/SendOTPRes/createSendOTP", "sendOtpEndPoint": "/resident/v1/req/otp" } }, output={ "sendOtpResp":{ "sendOtpResTemplate":"esignet/SendOTPRes/createSendOTPResult" } }, inputTemplate=esignet/GenerateVID/createGenerateVID, outputTemplate=esignet/GenerateVID/createGenerateVIDResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generate perpetual VID VCI valid details, uniqueIdentifier=Dependent_Idrepo_GenerateVID_15, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:203)
at io.mosip.testrig.apirig.esignet.testscripts.PostWithAutogenIdWithOtpGenerate.test(PostWithAutogenIdWithOtpGenerate.java:89)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignetRes_Generate_Perpetual_VID_Valid_Smoke_sid |
| Testcase Dependency |
| [] |
| Class Name |
| PostWithAutogenIdWithOtpGenerate |
| Testcase Input |
| testCaseName=ESignetRes_Generate_Perpetual_VID_Valid_Smoke_sid, endPoint=/resident/v1/vid, role=resident, templateFields=null, input={ "transactionID": "$TRANSACTIONID$", "individualId": "$ID:AddIdentity_Vid_Generation_smoke_Pos_UIN$", "individualIdType": "UIN", "requesttime": "$TIMESTAMP$", "id": "mosip.resident.vid", "version": "v1", "vidType": "Perpetual", "otp": "$ID:AddIdentity_Vid_Generation_smoke_Pos_EMAIL$", "sendOtp":{ "transactionID": "$TRANSACTIONID$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Vid_Generation_smoke_Pos_UIN$", "individualIdType": "UIN", "sendOtpReqTemplate": "esignet/SendOTPRes/createSendOTP", "sendOtpEndPoint": "/resident/v1/req/otp" } }, output={ "sendOtpResp":{ "sendOtpResTemplate":"esignet/SendOTPRes/createSendOTPResult" } }, inputTemplate=esignet/GenerateVID/createGenerateVID, outputTemplate=esignet/GenerateVID/createGenerateVIDResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generate perpetual VID with all valid details, uniqueIdentifier=Dependent_Idrepo_GenerateVID_01, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:203)
at io.mosip.testrig.apirig.esignet.testscripts.PostWithAutogenIdWithOtpGenerate.test(PostWithAutogenIdWithOtpGenerate.java:89)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignetRes_Generate_Temporary2_VID_Valid_Smoke_sid |
| Testcase Dependency |
| [] |
| Class Name |
| PostWithAutogenIdWithOtpGenerate |
| Testcase Input |
| testCaseName=ESignetRes_Generate_Temporary2_VID_Valid_Smoke_sid, endPoint=/resident/v1/vid, role=resident, templateFields=null, input={ "transactionID": "$TRANSACTIONID$", "individualId": "$ID:AddIdentity_Vid_2_Generation_smoke_Pos_UIN$", "individualIdType": "UIN", "requesttime": "$TIMESTAMP$", "id": "mosip.resident.vid", "version": "v1", "vidType": "Temporary", "otp": "$ID:AddIdentity_Vid_2_Generation_smoke_Pos_EMAIL$", "sendOtp":{ "transactionID": "$TRANSACTIONID$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Vid_2_Generation_smoke_Pos_UIN$", "individualIdType": "UIN", "sendOtpReqTemplate": "esignet/SendOTPRes/createSendOTP", "sendOtpEndPoint": "/resident/v1/req/otp" } }, output={ "sendOtpResp":{ "sendOtpResTemplate":"esignet/SendOTPRes/createSendOTPResult" } }, inputTemplate=esignet/GenerateVID/createGenerateVID, outputTemplate=esignet/GenerateVID/createGenerateVIDResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generate temporary2 VID valid details, uniqueIdentifier=Dependent_Idrepo_GenerateVID_05, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:203)
at io.mosip.testrig.apirig.esignet.testscripts.PostWithAutogenIdWithOtpGenerate.test(PostWithAutogenIdWithOtpGenerate.java:89)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignetRes_Generate_Temporary_VID_Invalid_Scen_Valid_Smoke_sid |
| Testcase Dependency |
| [] |
| Class Name |
| PostWithAutogenIdWithOtpGenerate |
| Testcase Input |
| testCaseName=ESignetRes_Generate_Temporary_VID_Invalid_Scen_Valid_Smoke_sid, endPoint=/resident/v1/vid, role=resident, templateFields=null, input={ "transactionID": "$TRANSACTIONID$", "individualId": "$ID:AddIdentity_Invalid_Scen_smoke_Pos_UIN$", "individualIdType": "UIN", "requesttime": "$TIMESTAMP$", "id": "mosip.resident.vid", "version": "v1", "vidType": "Temporary", "otp": "$ID:AddIdentity_Invalid_Scen_smoke_Pos_EMAIL$", "sendOtp":{ "transactionID": "$TRANSACTIONID$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Invalid_Scen_smoke_Pos_UIN$", "individualIdType": "UIN", "sendOtpReqTemplate": "esignet/SendOTPRes/createSendOTP", "sendOtpEndPoint": "/resident/v1/req/otp" } }, output={ "sendOtpResp":{ "sendOtpResTemplate":"esignet/SendOTPRes/createSendOTPResult" } }, inputTemplate=esignet/GenerateVID/createGenerateVID, outputTemplate=esignet/GenerateVID/createGenerateVIDResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generate temporary VID invalid scen valid details, uniqueIdentifier=Dependent_Idrepo_GenerateVID_10, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:203)
at io.mosip.testrig.apirig.esignet.testscripts.PostWithAutogenIdWithOtpGenerate.test(PostWithAutogenIdWithOtpGenerate.java:89)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignetRes_Generate_Temporary_VID_Valid_Smoke_sid |
| Testcase Dependency |
| [] |
| Class Name |
| PostWithAutogenIdWithOtpGenerate |
| Testcase Input |
| testCaseName=ESignetRes_Generate_Temporary_VID_Valid_Smoke_sid, endPoint=/resident/v1/vid, role=resident, templateFields=null, input={ "transactionID": "$TRANSACTIONID$", "individualId": "$ID:AddIdentity_Vid_Generation_smoke_Pos_UIN$", "individualIdType": "UIN", "requesttime": "$TIMESTAMP$", "id": "mosip.resident.vid", "version": "v1", "vidType": "Temporary", "otp": "$ID:AddIdentity_Vid_Generation_smoke_Pos_EMAIL$", "sendOtp":{ "transactionID": "$TRANSACTIONID$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Vid_Generation_smoke_Pos_UIN$", "individualIdType": "UIN", "sendOtpReqTemplate": "esignet/SendOTPRes/createSendOTP", "sendOtpEndPoint": "/resident/v1/req/otp" } }, output={ "sendOtpResp":{ "sendOtpResTemplate":"esignet/SendOTPRes/createSendOTPResult" } }, inputTemplate=esignet/GenerateVID/createGenerateVID, outputTemplate=esignet/GenerateVID/createGenerateVIDResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generate temporary VID with valid details, uniqueIdentifier=Dependent_Idrepo_GenerateVID_02, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:203)
at io.mosip.testrig.apirig.esignet.testscripts.PostWithAutogenIdWithOtpGenerate.test(PostWithAutogenIdWithOtpGenerate.java:89)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_CreateOIDCClient_Misp_Valid_Smoke_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_CreateOIDCClient_Misp_Valid_Smoke_sid, endPoint=/v1/esignet/client-mgmt/oauth-client, role=partner, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$RANDOMIDFOROIDCCLIENT$", "clientName": "MOSIP OIDC Client", "logoUri": "https://health-services.com/logo.png", "relyingPartyId": "Bharathi-Inc", "redirectUris": "$IDPREDIRECTURI$", "publicKey": "$OIDCJWKKEY3$", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{acrValues: "mosip:idp:acr:static-code"},{acrValues: "mosip:idp:acr:generated-code"},{acrValues: "mosip:idp:acr:biometrics"},{acrValues: "mosip:idp:acr:password"},{acrValues: "mosip:idp:acr:linked-wallet"},{acrValues: "mosip:idp:acr:knowledge"},{acrValues: "mosip:idp:acr:id-token"}], "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt", "keyLang1": "$1STLANG$", "clientNameLang": "MOSIP OIDC Client" }, output={ "status": "ACTIVE" }, inputTemplate=esignet/OIDCClientV2/OIDCClientV2, outputTemplate=esignet/OIDCClientV2/OIDCClientV2Result, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=To create OIDC Client V2 with all valid data, uniqueIdentifier=null, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_CreateOIDCClient_NonAuth_all_Valid_Smoke_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_CreateOIDCClient_NonAuth_all_Valid_Smoke_sid, endPoint=/v1/esignet/client-mgmt/oauth-client, role=partner, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$RANDOMIDFOROIDCCLIENT$", "clientName": "MOSIP OIDC Client", "logoUri": "https://health-services.com/logo.png", "relyingPartyId": "Bharathi-Inc", "redirectUris": "$IDPREDIRECTURI$", "publicKey": "$JWKKEY$", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{acrValues: "mosip:idp:acr:static-code"},{acrValues: "mosip:idp:acr:generated-code"},{acrValues: "mosip:idp:acr:biometrics"}], "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt", "keyLang1": "$1STLANG$", "clientNameLang": "MOSIP OIDC Client" }, output={ "status": "ACTIVE" }, inputTemplate=esignet/OIDCClientV2/OIDCClientV2, outputTemplate=esignet/OIDCClientV2/OIDCClientV2Result, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=To create OIDC Client V2 with all valid data, uniqueIdentifier=null, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_CreateOIDCClient_all_Valid_Smoke_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_CreateOIDCClient_all_Valid_Smoke_sid, endPoint=/v1/esignet/client-mgmt/oauth-client, role=partner, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$RANDOMIDFOROIDCCLIENT$", "clientName": "MOSIP OIDC Client", "logoUri": "https://health-services.com/logo.png", "relyingPartyId": "Bharathi-Inc", "redirectUris": "$IDPREDIRECTURI$", "publicKey": "$OIDCJWKKEY$", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{acrValues: "mosip:idp:acr:static-code"},{acrValues: "mosip:idp:acr:generated-code"},{acrValues: "mosip:idp:acr:biometrics"},{acrValues: "mosip:idp:acr:password"},{acrValues: "mosip:idp:acr:linked-wallet"},{acrValues: "mosip:idp:acr:knowledge"},{acrValues: "mosip:idp:acr:id-token"}], "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt", "keyLang1": "$1STLANG$", "clientNameLang": "MOSIP OIDC Client" }, output={ "status": "ACTIVE" }, inputTemplate=esignet/OIDCClientV2/OIDCClientV2, outputTemplate=esignet/OIDCClientV2/OIDCClientV2Result, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=To create OIDC Client V2 with all valid data, uniqueIdentifier=null, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_SendBindingOtp_Vid_Empty_IndividualId_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=ESignet_SendBindingOtp_Vid_Empty_IndividualId_Neg, endPoint=/v1/esignet/binding/binding-otp, role=mobileauth, templateFields=null, input={ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "$TIMESTAMP$", "individualId": "", "otpChannels": [{channel: "email"},{channel: "phone"}] }, output={ "errors": [ { "errorCode": "invalid_identifier" } ] }, inputTemplate=esignet/SendBindingOtp/SendBindingOtp, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Send binding Otp VID with empty individualId, uniqueIdentifier=TC_ESignet_SendBindingOtp_28, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePost.test(SimplePost.java:98)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_SendBindingOtp_Vid_Empty_OtpChannels_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=ESignet_SendBindingOtp_Vid_Empty_OtpChannels_Neg, endPoint=/v1/esignet/binding/binding-otp, role=mobileauth, templateFields=null, input={ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_UIN$", "otpChannels": [{channel: ""}] }, output={ "errors": [ { "errorCode": "invalid_otp_channel" } ] }, inputTemplate=esignet/SendBindingOtp/SendBindingOtp, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Send binding Otp VID with empty OtpChannels, uniqueIdentifier=TC_ESignet_SendBindingOtp_30, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePost.test(SimplePost.java:98)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_SendBindingOtp_Vid_Future_RequestTime_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=ESignet_SendBindingOtp_Vid_Future_RequestTime_Neg, endPoint=/v1/esignet/binding/binding-otp, role=mobileauth, templateFields=null, input={ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "2033-11-07T06:51:30.195Z", "individualId": "$ID:Generate_Perpetual_VID_Valid_Smoke_sid_vid$", "otpChannels": [{channel: "email"},{channel: "phone"}] }, output={ "errors": [ { "errorCode": "invalid_request" } ] }, inputTemplate=esignet/SendBindingOtp/SendBindingOtp, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Send binding Otp VID with future requestTime, uniqueIdentifier=TC_ESignet_SendBindingOtp_22, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePost.test(SimplePost.java:98)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_SendBindingOtp_Vid_Invalid_Case_IndividualId_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=ESignet_SendBindingOtp_Vid_Invalid_Case_IndividualId_Neg, endPoint=/v1/esignet/binding/binding-otp, role=mobileauth, templateFields=null, input={ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "$TIMESTAMP$", "individualId": "@#$#$##", "otpChannels": [{channel: "email"},{channel: "phone"}] }, output={ "errors": [ { "errorCode": "IDA-MLC-009" } ] }, inputTemplate=esignet/SendBindingOtp/SendBindingOtp, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Send binding Otp VID with invalid case in individualId, uniqueIdentifier=TC_ESignet_SendBindingOtp_26, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePost.test(SimplePost.java:98)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_SendBindingOtp_Vid_Invalid_OtpChannels_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=ESignet_SendBindingOtp_Vid_Invalid_OtpChannels_Neg, endPoint=/v1/esignet/binding/binding-otp, role=mobileauth, templateFields=null, input={ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_UIN$", "otpChannels": [{channel: "emaeill"},{channel: "moebileee"}] }, output={ "errors": [ { "errorCode": "invalid_otp_channel" } ] }, inputTemplate=esignet/SendBindingOtp/SendBindingOtp, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Send binding Otp VID with invalid OtpChannels, uniqueIdentifier=TC_ESignet_SendBindingOtp_31, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePost.test(SimplePost.java:98)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_SendBindingOtp_Vid_Invalid_RequestTime_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=ESignet_SendBindingOtp_Vid_Invalid_RequestTime_Neg, endPoint=/v1/esignet/binding/binding-otp, role=mobileauth, templateFields=null, input={ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "2022-11-08T06:35:53", "individualId": "$ID:Generate_Perpetual_VID_Valid_Smoke_sid_vid$", "otpChannels": [{channel: "email"},{channel: "phone"}] }, output={ "errors": [ { "errorCode": "invalid_request" } ] }, inputTemplate=esignet/SendBindingOtp/SendBindingOtp, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Send binding Otp VID with invalid requestTime, uniqueIdentifier=TC_ESignet_SendBindingOtp_20, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePost.test(SimplePost.java:98)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_SendBindingOtp_Vid_Missing_IndividualId_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=ESignet_SendBindingOtp_Vid_Missing_IndividualId_Neg, endPoint=/v1/esignet/binding/binding-otp, role=mobileauth, templateFields=null, input={ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "$TIMESTAMP$", "individualId": "$REMOVE$", "otpChannels": [{channel: "email"},{channel: "phone"}] }, output={ "errors": [ { "errorCode": "invalid_identifier" } ] }, inputTemplate=esignet/SendBindingOtp/SendBindingOtp, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Send binding Otp VID without individualId, uniqueIdentifier=TC_ESignet_SendBindingOtp_27, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePost.test(SimplePost.java:98)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_SendBindingOtp_Vid_Missing_OtpChannels_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=ESignet_SendBindingOtp_Vid_Missing_OtpChannels_Neg, endPoint=/v1/esignet/binding/binding-otp, role=mobileauth, templateFields=null, input={ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_UIN$", "otpChannels": "$REMOVE$" }, output={ "errors": [ { "errorCode": "invalid_otp_channel" } ] }, inputTemplate=esignet/SendBindingOtp/SendBindingOtpEmptyOtpChannel, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Send binding Otp VID without OtpChannels, uniqueIdentifier=TC_ESignet_SendBindingOtp_29, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePost.test(SimplePost.java:98)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_SendBindingOtp_Vid_Missing_RequestTime_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=ESignet_SendBindingOtp_Vid_Missing_RequestTime_Neg, endPoint=/v1/esignet/binding/binding-otp, role=mobileauth, templateFields=null, input={ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "$REMOVE$", "individualId": "$ID:Generate_Perpetual_VID_Valid_Smoke_sid_vid$", "otpChannels": [{channel: "email"},{channel: "phone"}] }, output={ "errors": [ { "errorCode": "invalid_request" } ] }, inputTemplate=esignet/SendBindingOtp/SendBindingOtp, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Send binding Otp VID without requestTime, uniqueIdentifier=TC_ESignet_SendBindingOtp_23, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePost.test(SimplePost.java:98)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_SendBindingOtp_Vid_Past_RequestTime_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=ESignet_SendBindingOtp_Vid_Past_RequestTime_Neg, endPoint=/v1/esignet/binding/binding-otp, role=mobileauth, templateFields=null, input={ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "2022-11-07T06:51:30.195Z", "individualId": "$ID:Generate_Perpetual_VID_Valid_Smoke_sid_vid$", "otpChannels": [{channel: "email"},{channel: "phone"}] }, output={ "errors": [ { "errorCode": "invalid_request" } ] }, inputTemplate=esignet/SendBindingOtp/SendBindingOtp, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Send binding Otp VID with past requestTime, uniqueIdentifier=TC_ESignet_SendBindingOtp_21, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePost.test(SimplePost.java:98)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_SendBindingOtp_Vid_Space_As_RequestTime_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=ESignet_SendBindingOtp_Vid_Space_As_RequestTime_Neg, endPoint=/v1/esignet/binding/binding-otp, role=mobileauth, templateFields=null, input={ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": " ", "individualId": "$ID:Generate_Perpetual_VID_Valid_Smoke_sid_vid$", "otpChannels": [{channel: "email"},{channel: "phone"}] }, output={ "errors": [ { "errorCode": "invalid_request" } ] }, inputTemplate=esignet/SendBindingOtp/SendBindingOtp, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Send binding Otp VID with only space in requestTime, uniqueIdentifier=TC_ESignet_SendBindingOtp_24, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePost.test(SimplePost.java:98)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_SendBindingOtp_Vid_Space_Sep_OtpChannels_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=ESignet_SendBindingOtp_Vid_Space_Sep_OtpChannels_Neg, endPoint=/v1/esignet/binding/binding-otp, role=mobileauth, templateFields=null, input={ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_UIN$", "otpChannels": [{channel: "em ail"},{channel: "mobi le"}] }, output={ "errors": [ { "errorCode": "invalid_otp_channel" } ] }, inputTemplate=esignet/SendBindingOtp/SendBindingOtp, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Send binding Otp VID with space separated OtpChannels, uniqueIdentifier=TC_ESignet_SendBindingOtp_32, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePost.test(SimplePost.java:98)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_SendBindingOtp_Vid_Valid_Smoke_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=ESignet_SendBindingOtp_Vid_Valid_Smoke_sid, endPoint=/v1/esignet/binding/binding-otp, role=mobileauth, templateFields=null, input={ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Valid_Smoke_sid_vid$", "otpChannels": [{channel: "email"},{channel: "phone"}] }, output={ }, inputTemplate=esignet/SendBindingOtp/SendBindingOtp, outputTemplate=esignet/SendBindingOtp/SendBindingOtpResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Send binding Otp for VID with valid details, uniqueIdentifier=TC_ESignet_SendBindingOtp_02, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePost.test(SimplePost.java:98)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_SendBindingOtp_Vid_invalid_individual_id_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=ESignet_SendBindingOtp_Vid_invalid_individual_id_Neg, endPoint=/v1/esignet/binding/binding-otp, role=mobileauth, templateFields=null, input={ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "$TIMESTAMP$", "individualId": "168461341611351", "otpChannels": [{channel: "email"},{channel: "phone"}] }, output={ "errors": [ { "errorCode": "IDA-MLC-009" } ] }, inputTemplate=esignet/SendBindingOtp/SendBindingOtp, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Send binding Otp VID with invalid individualId, uniqueIdentifier=TC_ESignet_SendBindingOtp_25, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePost.test(SimplePost.java:98)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_SendBindingOtp_uin_Email_Valid_Smoke_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=ESignet_SendBindingOtp_uin_Email_Valid_Smoke_sid, endPoint=/v1/esignet/binding/binding-otp, role=mobileauth, templateFields=null, input={ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Valid_Params_WOPhone_smoke_Pos_UIN$", "otpChannels": [{channel: "email"}] }, output={ }, inputTemplate=esignet/SendBindingOtp/SendBindingOtp, outputTemplate=esignet/SendBindingOtp/SendBindingOtpResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Send binding Otp to email for UIN with valid details, uniqueIdentifier=TC_ESignet_SendBindingOtp_03, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:210)
at io.mosip.testrig.apirig.esignet.testscripts.SimplePost.test(SimplePost.java:87)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_SendBindingOtp_uin_Empty_IndividualId_Neg |
| Testcase Dependency |
| [Esignet_PartnerSelfRegistration_All_Valid_Smoke_sid, ESignet_GenerateApiKey_Valid_Smoke_sid] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=ESignet_SendBindingOtp_uin_Empty_IndividualId_Neg, endPoint=/v1/esignet/binding/binding-otp, role=mobileauth, templateFields=null, input={ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "$TIMESTAMP$", "individualId": "", "otpChannels": [{channel: "email"},{channel: "phone"}] }, output={ "errors": [ { "errorCode": "invalid_identifier" } ] }, inputTemplate=esignet/SendBindingOtp/SendBindingOtp, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Send binding Otp UIN with empty individualId, uniqueIdentifier=TC_ESignet_SendBindingOtp_15, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_SendBindingOtp_uin_Empty_OtpChannels_Neg |
| Testcase Dependency |
| [Esignet_PartnerSelfRegistration_All_Valid_Smoke_sid, Dependent_Idrepo_AddIdentity_04, ESignet_GenerateApiKey_Valid_Smoke_sid] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=ESignet_SendBindingOtp_uin_Empty_OtpChannels_Neg, endPoint=/v1/esignet/binding/binding-otp, role=mobileauth, templateFields=null, input={ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_UIN$", "otpChannels": [{channel: ""}] }, output={ "errors": [ { "errorCode": "invalid_otp_channel" } ] }, inputTemplate=esignet/SendBindingOtp/SendBindingOtp, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Send binding Otp UIN with empty OtpChannels, uniqueIdentifier=TC_ESignet_SendBindingOtp_17, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_SendBindingOtp_uin_Future_RequestTime_Neg |
| Testcase Dependency |
| [Esignet_PartnerSelfRegistration_All_Valid_Smoke_sid, Dependent_Idrepo_AddIdentity_04, ESignet_GenerateApiKey_Valid_Smoke_sid] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=ESignet_SendBindingOtp_uin_Future_RequestTime_Neg, endPoint=/v1/esignet/binding/binding-otp, role=mobileauth, templateFields=null, input={ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "2033-11-07T06:51:30.195Z", "individualId": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}] }, output={ "errors": [ { "errorCode": "invalid_request" } ] }, inputTemplate=esignet/SendBindingOtp/SendBindingOtp, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Send binding Otp for UIN with future requestTime, uniqueIdentifier=TC_ESignet_SendBindingOtp_07, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_SendBindingOtp_uin_Invalid_Case_IndividualId_Neg |
| Testcase Dependency |
| [Esignet_PartnerSelfRegistration_All_Valid_Smoke_sid, ESignet_GenerateApiKey_Valid_Smoke_sid] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=ESignet_SendBindingOtp_uin_Invalid_Case_IndividualId_Neg, endPoint=/v1/esignet/binding/binding-otp, role=mobileauth, templateFields=null, input={ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "$TIMESTAMP$", "individualId": "@#$#$##", "otpChannels": [{channel: "email"},{channel: "phone"}] }, output={ "errors": [ { "errorCode": "IDA-MLC-009" } ] }, inputTemplate=esignet/SendBindingOtp/SendBindingOtp, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=IDA-MLC-009,invalid_individual_id, kycFields=null, description=Send binding Otp for UIN with invalid case in individualId, uniqueIdentifier=TC_ESignet_SendBindingOtp_11, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_SendBindingOtp_uin_Invalid_OtpChannels_Neg |
| Testcase Dependency |
| [Esignet_PartnerSelfRegistration_All_Valid_Smoke_sid, Dependent_Idrepo_AddIdentity_04, ESignet_GenerateApiKey_Valid_Smoke_sid] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=ESignet_SendBindingOtp_uin_Invalid_OtpChannels_Neg, endPoint=/v1/esignet/binding/binding-otp, role=mobileauth, templateFields=null, input={ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_UIN$", "otpChannels": [{channel: "emaeill"},{channel: "moebileee"}] }, output={ "errors": [ { "errorCode": "invalid_otp_channel" } ] }, inputTemplate=esignet/SendBindingOtp/SendBindingOtp, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Send binding Otp UIN with invalid OtpChannels, uniqueIdentifier=TC_ESignet_SendBindingOtp_18, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_SendBindingOtp_uin_Invalid_RequestTime_Neg |
| Testcase Dependency |
| [Esignet_PartnerSelfRegistration_All_Valid_Smoke_sid, Dependent_Idrepo_AddIdentity_04, ESignet_GenerateApiKey_Valid_Smoke_sid] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=ESignet_SendBindingOtp_uin_Invalid_RequestTime_Neg, endPoint=/v1/esignet/binding/binding-otp, role=mobileauth, templateFields=null, input={ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "2022-11-08T06:35:53", "individualId": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}] }, output={ "errors": [ { "errorCode": "invalid_request" } ] }, inputTemplate=esignet/SendBindingOtp/SendBindingOtp, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Send binding Otp for UIN with invalid requestTime, uniqueIdentifier=TC_ESignet_SendBindingOtp_05, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_SendBindingOtp_uin_Missing_IndividualId_Neg |
| Testcase Dependency |
| [Esignet_PartnerSelfRegistration_All_Valid_Smoke_sid, ESignet_GenerateApiKey_Valid_Smoke_sid] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=ESignet_SendBindingOtp_uin_Missing_IndividualId_Neg, endPoint=/v1/esignet/binding/binding-otp, role=mobileauth, templateFields=null, input={ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "$TIMESTAMP$", "individualId": "$REMOVE$", "otpChannels": [{channel: "email"},{channel: "phone"}] }, output={ "errors": [ { "errorCode": "invalid_identifier" } ] }, inputTemplate=esignet/SendBindingOtp/SendBindingOtp, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Send binding Otp UIN without individualId, uniqueIdentifier=TC_ESignet_SendBindingOtp_14, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_SendBindingOtp_uin_Missing_OtpChannels_Neg |
| Testcase Dependency |
| [Esignet_PartnerSelfRegistration_All_Valid_Smoke_sid, Dependent_Idrepo_AddIdentity_04, ESignet_GenerateApiKey_Valid_Smoke_sid] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=ESignet_SendBindingOtp_uin_Missing_OtpChannels_Neg, endPoint=/v1/esignet/binding/binding-otp, role=mobileauth, templateFields=null, input={ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_UIN$", "otpChannels": "$REMOVE$" }, output={ "errors": [ { "errorCode": "invalid_otp_channel" } ] }, inputTemplate=esignet/SendBindingOtp/SendBindingOtpEmptyOtpChannel, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Send binding Otp UIN without OtpChannels, uniqueIdentifier=TC_ESignet_SendBindingOtp_16, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_SendBindingOtp_uin_Missing_RequestTime_Neg |
| Testcase Dependency |
| [Esignet_PartnerSelfRegistration_All_Valid_Smoke_sid, Dependent_Idrepo_AddIdentity_04, ESignet_GenerateApiKey_Valid_Smoke_sid] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=ESignet_SendBindingOtp_uin_Missing_RequestTime_Neg, endPoint=/v1/esignet/binding/binding-otp, role=mobileauth, templateFields=null, input={ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "$REMOVE$", "individualId": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}] }, output={ "errors": [ { "errorCode": "invalid_request" } ] }, inputTemplate=esignet/SendBindingOtp/SendBindingOtp, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Send binding Otp for UIN without requestTime, uniqueIdentifier=TC_ESignet_SendBindingOtp_08, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_SendBindingOtp_uin_NR_Email_IndividualId_Neg |
| Testcase Dependency |
| [Esignet_PartnerSelfRegistration_All_Valid_Smoke_sid, ESignet_GenerateApiKey_Valid_Smoke_sid, Dependent_Idrepo_AddIdentity_06] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=ESignet_SendBindingOtp_uin_NR_Email_IndividualId_Neg, endPoint=/v1/esignet/binding/binding-otp, role=mobileauth, templateFields=null, input={ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Valid_Params_WOEmail_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}] }, output={ }, inputTemplate=esignet/SendBindingOtp/SendBindingOtp, outputTemplate=esignet/SendBindingOtp/SendBindingOtpResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Send binding Otp for UIN NR email for individualId, uniqueIdentifier=TC_ESignet_SendBindingOtp_12, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_SendBindingOtp_uin_NR_Phone_IndividualId_Neg |
| Testcase Dependency |
| [Esignet_PartnerSelfRegistration_All_Valid_Smoke_sid, Dependent_Idrepo_AddIdentity_05, ESignet_GenerateApiKey_Valid_Smoke_sid] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=ESignet_SendBindingOtp_uin_NR_Phone_IndividualId_Neg, endPoint=/v1/esignet/binding/binding-otp, role=mobileauth, templateFields=null, input={ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Valid_Params_WOPhone_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}] }, output={ }, inputTemplate=esignet/SendBindingOtp/SendBindingOtp, outputTemplate=esignet/SendBindingOtp/SendBindingOtpResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Send binding Otp UIN NR phone for individualId, uniqueIdentifier=TC_ESignet_SendBindingOtp_13, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_SendBindingOtp_uin_Past_RequestTime_Neg |
| Testcase Dependency |
| [Esignet_PartnerSelfRegistration_All_Valid_Smoke_sid, Dependent_Idrepo_AddIdentity_04, ESignet_GenerateApiKey_Valid_Smoke_sid] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=ESignet_SendBindingOtp_uin_Past_RequestTime_Neg, endPoint=/v1/esignet/binding/binding-otp, role=mobileauth, templateFields=null, input={ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "2022-11-07T06:51:30.195Z", "individualId": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}] }, output={ "errors": [ { "errorCode": "invalid_request" } ] }, inputTemplate=esignet/SendBindingOtp/SendBindingOtp, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Send binding Otp for UIN with past requestTime, uniqueIdentifier=TC_ESignet_SendBindingOtp_06, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_SendBindingOtp_uin_Phone_Valid_Smoke_sid |
| Testcase Dependency |
| [Esignet_PartnerSelfRegistration_All_Valid_Smoke_sid, ESignet_GenerateApiKey_Valid_Smoke_sid, Dependent_Idrepo_AddIdentity_06] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=ESignet_SendBindingOtp_uin_Phone_Valid_Smoke_sid, endPoint=/v1/esignet/binding/binding-otp, role=mobileauth, templateFields=null, input={ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Valid_Params_WOEmail_smoke_Pos_UIN$", "otpChannels": [{channel: "phone"}] }, output={ }, inputTemplate=esignet/SendBindingOtp/SendBindingOtp, outputTemplate=esignet/SendBindingOtp/SendBindingOtpResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Send binding Otp to phone for UIN with valid details, uniqueIdentifier=TC_ESignet_SendBindingOtp_04, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_SendBindingOtp_uin_Space_As_RequestTime_Neg |
| Testcase Dependency |
| [Esignet_PartnerSelfRegistration_All_Valid_Smoke_sid, Dependent_Idrepo_AddIdentity_04, ESignet_GenerateApiKey_Valid_Smoke_sid] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=ESignet_SendBindingOtp_uin_Space_As_RequestTime_Neg, endPoint=/v1/esignet/binding/binding-otp, role=mobileauth, templateFields=null, input={ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": " ", "individualId": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}] }, output={ "errors": [ { "errorCode": "invalid_request" } ] }, inputTemplate=esignet/SendBindingOtp/SendBindingOtp, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Send binding Otp for UIN with space in requestTime, uniqueIdentifier=TC_ESignet_SendBindingOtp_09, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_SendBindingOtp_uin_Space_Sep_OtpChannels_Neg |
| Testcase Dependency |
| [Esignet_PartnerSelfRegistration_All_Valid_Smoke_sid, Dependent_Idrepo_AddIdentity_04, ESignet_GenerateApiKey_Valid_Smoke_sid] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=ESignet_SendBindingOtp_uin_Space_Sep_OtpChannels_Neg, endPoint=/v1/esignet/binding/binding-otp, role=mobileauth, templateFields=null, input={ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_UIN$", "otpChannels": [{channel: "em ail"},{channel: "mobi le"}] }, output={ "errors": [ { "errorCode": "invalid_otp_channel" } ] }, inputTemplate=esignet/SendBindingOtp/SendBindingOtp, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Send binding Otp UIN with space separated OtpChannels, uniqueIdentifier=TC_ESignet_SendBindingOtp_19, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_SendBindingOtp_uin_all_Valid_Smoke_sid |
| Testcase Dependency |
| [Esignet_PartnerSelfRegistration_All_Valid_Smoke_sid, Dependent_Idrepo_AddIdentity_04, ESignet_GenerateApiKey_Valid_Smoke_sid] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=ESignet_SendBindingOtp_uin_all_Valid_Smoke_sid, endPoint=/v1/esignet/binding/binding-otp, role=mobileauth, templateFields=null, input={ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}] }, output={ }, inputTemplate=esignet/SendBindingOtp/SendBindingOtp, outputTemplate=esignet/SendBindingOtp/SendBindingOtpResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Send binding Otp for UIN with all valid details, uniqueIdentifier=TC_ESignet_SendBindingOtp_01, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_SendBindingOtp_uin_invalid_individual_id_Neg |
| Testcase Dependency |
| [Esignet_PartnerSelfRegistration_All_Valid_Smoke_sid, ESignet_GenerateApiKey_Valid_Smoke_sid] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=ESignet_SendBindingOtp_uin_invalid_individual_id_Neg, endPoint=/v1/esignet/binding/binding-otp, role=mobileauth, templateFields=null, input={ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "$TIMESTAMP$", "individualId": "168461341611351", "otpChannels": [{channel: "email"},{channel: "phone"}] }, output={ "errors": [ { "errorCode": "IDA-MLC-009" } ] }, inputTemplate=esignet/SendBindingOtp/SendBindingOtp, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=IDA-MLC-009,invalid_individual_id, kycFields=null, description=Send binding Otp for UIN with invalid individualId, uniqueIdentifier=TC_ESignet_SendBindingOtp_10, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_WalletBinding_Vid_EmptyVal_AuthFactorType_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PostWithBodyWithOtpGenerate |
| Testcase Input |
| testCaseName=ESignet_WalletBinding_Vid_EmptyVal_AuthFactorType_Neg, endPoint=/v1/esignet/binding/wallet-binding, role=mobileauth, templateFields=null, input={ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Valid_Smoke_sid_vid$", "authFactorType": "", "challenge": "$ID:AddIdentity_Vid_Generation_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "$JWKKEY$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "individualId": "$ID:Generate_Perpetual_VID_Valid_Smoke_sid_vid$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendBindingOtp/SendBindingOtp", "sendOtpEndPoint": "/v1/esignet/binding/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_auth_factor_type", "errorMessage": "request.challengeList[0].authFactorType: invalid_auth_factor_type" } ], "sendOtpResp": { "sendOtpResTemplate":"esignet/SendBindingOtp/SendBindingOtpResult" } }, inputTemplate=esignet/WalletBinding/WalletBinding, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=invalid_auth_factor_type, kycFields=null, description=Wallet binding VID with empty value in AuthFactorType, uniqueIdentifier=TC_ESignet_WalletBinding_45, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.PostWithBodyWithOtpGenerate.test(PostWithBodyWithOtpGenerate.java:92)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_WalletBinding_Vid_EmptyVal_Challenge_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PostWithBodyWithOtpGenerate |
| Testcase Input |
| testCaseName=ESignet_WalletBinding_Vid_EmptyVal_Challenge_Neg, endPoint=/v1/esignet/binding/wallet-binding, role=mobileauth, templateFields=null, input={ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Valid_Smoke_sid_vid$", "authFactorType": "OTP", "challenge": "", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "$JWKKEY$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "individualId": "$ID:Generate_Perpetual_VID_Valid_Smoke_sid_vid$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendBindingOtp/SendBindingOtp", "sendOtpEndPoint": "/v1/esignet/binding/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_challenge", "errorMessage": "request.challengeList[0].challenge: invalid_challenge" } ], "sendOtpResp": { "sendOtpResTemplate":"esignet/SendBindingOtp/SendBindingOtpResult" } }, inputTemplate=esignet/WalletBinding/WalletBinding, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=invalid_challenge, kycFields=null, description=Wallet binding VID with empty value in challenge, uniqueIdentifier=TC_ESignet_WalletBinding_48, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.PostWithBodyWithOtpGenerate.test(PostWithBodyWithOtpGenerate.java:92)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_WalletBinding_Vid_Empty_Formate_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PostWithBodyWithOtpGenerate |
| Testcase Input |
| testCaseName=ESignet_WalletBinding_Vid_Empty_Formate_Neg, endPoint=/v1/esignet/binding/wallet-binding, role=mobileauth, templateFields=null, input={ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Valid_Smoke_sid_vid$", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Vid_Generation_smoke_Pos_EMAIL$", "format": "", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "$JWKKEY$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "individualId": "$ID:Generate_Perpetual_VID_Valid_Smoke_sid_vid$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendBindingOtp/SendBindingOtp", "sendOtpEndPoint": "/v1/esignet/binding/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_challenge_format" } ], "sendOtpResp": { "sendOtpResTemplate":"esignet/SendBindingOtp/SendBindingOtpResult" } }, inputTemplate=esignet/WalletBinding/WalletBinding, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=invalid_challenge_format, kycFields=null, description=Wallet binding VID with empty format, uniqueIdentifier=TC_ESignet_WalletBinding_54, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.PostWithBodyWithOtpGenerate.test(PostWithBodyWithOtpGenerate.java:92)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_WalletBinding_Vid_Empty_IndividualId_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PostWithBodyWithOtpGenerate |
| Testcase Input |
| testCaseName=ESignet_WalletBinding_Vid_Empty_IndividualId_Neg, endPoint=/v1/esignet/binding/wallet-binding, role=mobileauth, templateFields=null, input={ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "$TIMESTAMP$", "individualId": "", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Vid_Generation_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "$JWKKEY$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "individualId": "$ID:Generate_Perpetual_VID_Valid_Smoke_sid_vid$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendBindingOtp/SendBindingOtp", "sendOtpEndPoint": "/v1/esignet/binding/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_individual_id", "errorMessage": "request.individualId: invalid_individual_id" } ], "sendOtpResp": { "sendOtpResTemplate":"esignet/SendBindingOtp/SendBindingOtpResult" } }, inputTemplate=esignet/WalletBinding/WalletBinding, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Wallet binding VID with empty individualId, uniqueIdentifier=TC_ESignet_WalletBinding_39, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.PostWithBodyWithOtpGenerate.test(PostWithBodyWithOtpGenerate.java:92)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_WalletBinding_Vid_Empty_authFactorType1_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PostWithBodyWithOtpGenerate |
| Testcase Input |
| testCaseName=ESignet_WalletBinding_Vid_Empty_authFactorType1_Neg, endPoint=/v1/esignet/binding/wallet-binding, role=mobileauth, templateFields=null, input={ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Valid_Smoke_sid_vid$", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Vid_Generation_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": "", "format1": "jwt", "publicKey": "$JWKKEY$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "individualId": "$ID:Generate_Perpetual_VID_Valid_Smoke_sid_vid$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendBindingOtp/SendBindingOtp", "sendOtpEndPoint": "/v1/esignet/binding/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_auth_factor_type", "errorMessage": "request.authFactorType: invalid_auth_factor_type" } ], "sendOtpResp": { "sendOtpResTemplate":"esignet/SendBindingOtp/SendBindingOtpResult" } }, inputTemplate=esignet/WalletBinding/WalletBinding, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Wallet binding VID with empty authFactorType1, uniqueIdentifier=TC_ESignet_WalletBinding_57, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.PostWithBodyWithOtpGenerate.test(PostWithBodyWithOtpGenerate.java:92)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_WalletBinding_Vid_Empty_format1_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PostWithBodyWithOtpGenerate |
| Testcase Input |
| testCaseName=ESignet_WalletBinding_Vid_Empty_format1_Neg, endPoint=/v1/esignet/binding/wallet-binding, role=mobileauth, templateFields=null, input={ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Valid_Smoke_sid_vid$", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Vid_Generation_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": "", "publicKey": "$JWKKEY$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "individualId": "$ID:Generate_Perpetual_VID_Valid_Smoke_sid_vid$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendBindingOtp/SendBindingOtp", "sendOtpEndPoint": "/v1/esignet/binding/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_challenge_format", "errorMessage": "request.format: unsupported_challenge_format" } ], "sendOtpResp": { "sendOtpResTemplate":"esignet/SendBindingOtp/SendBindingOtpResult" } }, inputTemplate=esignet/WalletBinding/WalletBinding, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Wallet binding VID with empty format1, uniqueIdentifier=TC_ESignet_WalletBinding_60, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.PostWithBodyWithOtpGenerate.test(PostWithBodyWithOtpGenerate.java:92)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_WalletBinding_Vid_Future_RequestTime_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PostWithBodyWithOtpGenerate |
| Testcase Input |
| testCaseName=ESignet_WalletBinding_Vid_Future_RequestTime_Neg, endPoint=/v1/esignet/binding/wallet-binding, role=mobileauth, templateFields=null, input={ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "2033-11-07T06:51:30.195Z", "individualId": "$ID:Generate_Perpetual_VID_Valid_Smoke_sid_vid$", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Vid_Generation_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "$JWKKEY$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "individualId": "$ID:Generate_Perpetual_VID_Valid_Smoke_sid_vid$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendBindingOtp/SendBindingOtp", "sendOtpEndPoint": "/v1/esignet/binding/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_request", "errorMessage": "requestTime: invalid_request" } ], "sendOtpResp": { "sendOtpResTemplate":"esignet/SendBindingOtp/SendBindingOtpResult" } }, inputTemplate=esignet/WalletBinding/WalletBinding, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Wallet binding VID with future requestTime, uniqueIdentifier=TC_ESignet_WalletBinding_37, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.PostWithBodyWithOtpGenerate.test(PostWithBodyWithOtpGenerate.java:92)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_WalletBinding_Vid_Invalid_AuthFactorType_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PostWithBodyWithOtpGenerate |
| Testcase Input |
| testCaseName=ESignet_WalletBinding_Vid_Invalid_AuthFactorType_Neg, endPoint=/v1/esignet/binding/wallet-binding, role=mobileauth, templateFields=null, input={ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Valid_Smoke_sid_vid$", "authFactorType": "dfg5", "challenge": "$ID:AddIdentity_Vid_Generation_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "$JWKKEY$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "individualId": "$ID:Generate_Perpetual_VID_Valid_Smoke_sid_vid$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendBindingOtp/SendBindingOtp", "sendOtpEndPoint": "/v1/esignet/binding/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_auth_factor_type" } ], "sendOtpResp": { "sendOtpResTemplate":"esignet/SendBindingOtp/SendBindingOtpResult" } }, inputTemplate=esignet/WalletBinding/WalletBinding, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Wallet binding VID with invalid authFactorType, uniqueIdentifier=TC_ESignet_WalletBinding_43, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.PostWithBodyWithOtpGenerate.test(PostWithBodyWithOtpGenerate.java:92)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_WalletBinding_Vid_Invalid_Challenge_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PostWithBodyWithOtpGenerate |
| Testcase Input |
| testCaseName=ESignet_WalletBinding_Vid_Invalid_Challenge_Neg, endPoint=/v1/esignet/binding/wallet-binding, role=mobileauth, templateFields=null, input={ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Valid_Smoke_sid_vid$", "authFactorType": "OTP", "challenge": "gd5$", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "$JWKKEY$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "individualId": "$ID:Generate_Perpetual_VID_Valid_Smoke_sid_vid$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendBindingOtp/SendBindingOtp", "sendOtpEndPoint": "/v1/esignet/binding/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_challenge" } ], "sendOtpResp": { "sendOtpResTemplate":"esignet/SendBindingOtp/SendBindingOtpResult" } }, inputTemplate=esignet/WalletBinding/WalletBinding, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Wallet binding VID with invalid challenge, uniqueIdentifier=TC_ESignet_WalletBinding_47, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.PostWithBodyWithOtpGenerate.test(PostWithBodyWithOtpGenerate.java:92)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_WalletBinding_Vid_Invalid_Formate_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PostWithBodyWithOtpGenerate |
| Testcase Input |
| testCaseName=ESignet_WalletBinding_Vid_Invalid_Formate_Neg, endPoint=/v1/esignet/binding/wallet-binding, role=mobileauth, templateFields=null, input={ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Valid_Smoke_sid_vid$", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Vid_Generation_smoke_Pos_EMAIL$", "format": "GT$r5", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "$JWKKEY$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "individualId": "$ID:Generate_Perpetual_VID_Valid_Smoke_sid_vid$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendBindingOtp/SendBindingOtp", "sendOtpEndPoint": "/v1/esignet/binding/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_challenge_format" } ], "sendOtpResp": { "sendOtpResTemplate":"esignet/SendBindingOtp/SendBindingOtpResult" } }, inputTemplate=esignet/WalletBinding/WalletBinding, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Wallet binding VID with invalid format, uniqueIdentifier=TC_ESignet_WalletBinding_51, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.PostWithBodyWithOtpGenerate.test(PostWithBodyWithOtpGenerate.java:92)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_WalletBinding_Vid_Invalid_IndividualId_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PostWithBodyWithOtpGenerate |
| Testcase Input |
| testCaseName=ESignet_WalletBinding_Vid_Invalid_IndividualId_Neg, endPoint=/v1/esignet/binding/wallet-binding, role=mobileauth, templateFields=null, input={ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "$TIMESTAMP$", "individualId": "$tyhg", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Vid_Generation_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "$JWKKEY$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "individualId": "$ID:Generate_Perpetual_VID_Valid_Smoke_sid_vid$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendBindingOtp/SendBindingOtp", "sendOtpEndPoint": "/v1/esignet/binding/binding-otp" } }, output={ "errors": [ { "errorCode": "IDA-MLC-009" } ], "sendOtpResp": { "sendOtpResTemplate":"esignet/SendBindingOtp/SendBindingOtpResult" } }, inputTemplate=esignet/WalletBinding/WalletBinding, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=binding_auth_failed,IDA-MLC-009, kycFields=null, description=Wallet binding VID with invalid individualId, uniqueIdentifier=TC_ESignet_WalletBinding_38, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.PostWithBodyWithOtpGenerate.test(PostWithBodyWithOtpGenerate.java:92)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_WalletBinding_Vid_Invalid_RequestTime_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PostWithBodyWithOtpGenerate |
| Testcase Input |
| testCaseName=ESignet_WalletBinding_Vid_Invalid_RequestTime_Neg, endPoint=/v1/esignet/binding/wallet-binding, role=mobileauth, templateFields=null, input={ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "asdf$", "individualId": "$ID:Generate_Perpetual_VID_Valid_Smoke_sid_vid$", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Vid_Generation_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "$JWKKEY$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "individualId": "$ID:Generate_Perpetual_VID_Valid_Smoke_sid_vid$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendBindingOtp/SendBindingOtp", "sendOtpEndPoint": "/v1/esignet/binding/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_request", "errorMessage": "requestTime: invalid_request" } ], "sendOtpResp": { "sendOtpResTemplate":"esignet/SendBindingOtp/SendBindingOtpResult" } }, inputTemplate=esignet/WalletBinding/WalletBinding, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Wallet binding VID with invalid requestTime, uniqueIdentifier=TC_ESignet_WalletBinding_35, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.PostWithBodyWithOtpGenerate.test(PostWithBodyWithOtpGenerate.java:92)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_WalletBinding_Vid_Invalid_authFactorType1_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PostWithBodyWithOtpGenerate |
| Testcase Input |
| testCaseName=ESignet_WalletBinding_Vid_Invalid_authFactorType1_Neg, endPoint=/v1/esignet/binding/wallet-binding, role=mobileauth, templateFields=null, input={ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Valid_Smoke_sid_vid$", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Vid_Generation_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": "hy$5", "format1": "jwt", "publicKey": "$JWKKEY$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "individualId": "$ID:Generate_Perpetual_VID_Valid_Smoke_sid_vid$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendBindingOtp/SendBindingOtp", "sendOtpEndPoint": "/v1/esignet/binding/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_auth_factor_type_or_challenge_format" } ], "sendOtpResp": { "sendOtpResTemplate":"esignet/SendBindingOtp/SendBindingOtpResult" } }, inputTemplate=esignet/WalletBinding/WalletBinding, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Wallet binding VID with invalid authFactorType1, uniqueIdentifier=TC_ESignet_WalletBinding_55, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.PostWithBodyWithOtpGenerate.test(PostWithBodyWithOtpGenerate.java:92)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_WalletBinding_Vid_Invalid_format1_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PostWithBodyWithOtpGenerate |
| Testcase Input |
| testCaseName=ESignet_WalletBinding_Vid_Invalid_format1_Neg, endPoint=/v1/esignet/binding/wallet-binding, role=mobileauth, templateFields=null, input={ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Valid_Smoke_sid_vid$", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Vid_Generation_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": "hju$5", "publicKey": "$JWKKEY$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "individualId": "$ID:Generate_Perpetual_VID_Valid_Smoke_sid_vid$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendBindingOtp/SendBindingOtp", "sendOtpEndPoint": "/v1/esignet/binding/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_auth_factor_type_or_challenge_format" } ], "sendOtpResp": { "sendOtpResTemplate":"esignet/SendBindingOtp/SendBindingOtpResult" } }, inputTemplate=esignet/WalletBinding/WalletBinding, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Wallet binding VID with invalid format1, uniqueIdentifier=TC_ESignet_WalletBinding_59, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.PostWithBodyWithOtpGenerate.test(PostWithBodyWithOtpGenerate.java:92)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_WalletBinding_Vid_Invalid_publicKey_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PostWithBodyWithOtpGenerate |
| Testcase Input |
| testCaseName=ESignet_WalletBinding_Vid_Invalid_publicKey_Neg, endPoint=/v1/esignet/binding/wallet-binding, role=mobileauth, templateFields=null, input={ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Valid_Smoke_sid_vid$", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Vid_Generation_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "ghj$4", "sendOtp":{ "requestTime": "$TIMESTAMP$", "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "individualId": "$ID:Generate_Perpetual_VID_Valid_Smoke_sid_vid$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendBindingOtp/SendBindingOtp", "sendOtpEndPoint": "/v1/esignet/binding/binding-otp" } }, output={ "errors": [ { "errorCode": "unknown_error", "errorMessage": "JSON parse error: Cannot construct instance of `java.util.LinkedHashMap` (although at least one Creator exists): no String-argument constructor/factory method to deserialize from String value (\u0027ghj$4\u0027); nested exception is com.fasterxml.jackson.databind.exc.MismatchedInputException: Cannot construct instance of `java.util.LinkedHashMap` (although at least one Creator exists): no String-argument constructor/factory method to deserialize from String value (\u0027ghj$4\u0027)\n at [Source: (PushbackInputStream); line: 1, column: 221] (through reference chain: io.mosip.idp.core.dto.RequestWrapper[\"request\"]-\u003eio.mosip.idp.core.dto.WalletBindingRequest[\"publicKey\"])" } ], "sendOtpResp": { "sendOtpResTemplate":"esignet/SendBindingOtp/SendBindingOtpResult" } }, inputTemplate=esignet/WalletBinding/WalletBinding, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Wallet binding VID with invalid publicKey, uniqueIdentifier=TC_ESignet_WalletBinding_63, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.PostWithBodyWithOtpGenerate.test(PostWithBodyWithOtpGenerate.java:92)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_WalletBinding_Vid_Missing_AuthFactorType_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PostWithBodyWithOtpGenerate |
| Testcase Input |
| testCaseName=ESignet_WalletBinding_Vid_Missing_AuthFactorType_Neg, endPoint=/v1/esignet/binding/wallet-binding, role=mobileauth, templateFields=null, input={ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Valid_Smoke_sid_vid$", "authFactorType": "$REMOVE$", "challenge": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "$JWKKEY$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "individualId": "$ID:Generate_Perpetual_VID_Valid_Smoke_sid_vid$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendBindingOtp/SendBindingOtp", "sendOtpEndPoint": "/v1/esignet/binding/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_auth_factor_type" } ], "sendOtpResp": { "sendOtpResTemplate":"esignet/SendBindingOtp/SendBindingOtpResult" } }, inputTemplate=esignet/WalletBinding/WalletBinding, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=invalid_auth_factor_type, kycFields=null, description=Wallet binding VID without AuthFactorType, uniqueIdentifier=TC_ESignet_WalletBinding_44, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.PostWithBodyWithOtpGenerate.test(PostWithBodyWithOtpGenerate.java:92)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_WalletBinding_Vid_Missing_Challenge_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PostWithBodyWithOtpGenerate |
| Testcase Input |
| testCaseName=ESignet_WalletBinding_Vid_Missing_Challenge_Neg, endPoint=/v1/esignet/binding/wallet-binding, role=mobileauth, templateFields=null, input={ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Valid_Smoke_sid_vid$", "authFactorType": "OTP", "challenge": "$REMOVE$", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "$JWKKEY$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "individualId": "$ID:Generate_Perpetual_VID_Valid_Smoke_sid_vid$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendBindingOtp/SendBindingOtp", "sendOtpEndPoint": "/v1/esignet/binding/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_challenge", "errorMessage": "request.challengeList[0].challenge: invalid_challenge" } ], "sendOtpResp": { "sendOtpResTemplate":"esignet/SendBindingOtp/SendBindingOtpResult" } }, inputTemplate=esignet/WalletBinding/WalletBinding, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=invalid_challenge, kycFields=null, description=Wallet binding VID without challenge, uniqueIdentifier=TC_ESignet_WalletBinding_49, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.PostWithBodyWithOtpGenerate.test(PostWithBodyWithOtpGenerate.java:92)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_WalletBinding_Vid_Missing_Formate_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PostWithBodyWithOtpGenerate |
| Testcase Input |
| testCaseName=ESignet_WalletBinding_Vid_Missing_Formate_Neg, endPoint=/v1/esignet/binding/wallet-binding, role=mobileauth, templateFields=null, input={ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Valid_Smoke_sid_vid$", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Vid_Generation_smoke_Pos_EMAIL$", "format": "$REMOVE$", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "$JWKKEY$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "individualId": "$ID:Generate_Perpetual_VID_Valid_Smoke_sid_vid$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendBindingOtp/SendBindingOtp", "sendOtpEndPoint": "/v1/esignet/binding/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_challenge_format", "errorMessage": "request.format: unsupported_challenge_format" } ], "sendOtpResp": { "sendOtpResTemplate":"esignet/SendBindingOtp/SendBindingOtpResult" } }, inputTemplate=esignet/WalletBinding/WalletBinding, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=invalid_challenge_format, kycFields=null, description=Wallet binding VID without format, uniqueIdentifier=TC_ESignet_WalletBinding_52, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.PostWithBodyWithOtpGenerate.test(PostWithBodyWithOtpGenerate.java:92)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_WalletBinding_Vid_Missing_IndividualId_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PostWithBodyWithOtpGenerate |
| Testcase Input |
| testCaseName=ESignet_WalletBinding_Vid_Missing_IndividualId_Neg, endPoint=/v1/esignet/binding/wallet-binding, role=mobileauth, templateFields=null, input={ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "$TIMESTAMP$", "individualId": "$REMOVE$", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Vid_Generation_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "$JWKKEY$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "individualId": "$ID:Generate_Perpetual_VID_Valid_Smoke_sid_vid$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendBindingOtp/SendBindingOtp", "sendOtpEndPoint": "/v1/esignet/binding/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_individual_id", "errorMessage": "request.individualId: invalid_individual_id" } ], "sendOtpResp": { "sendOtpResTemplate":"esignet/SendBindingOtp/SendBindingOtpResult" } }, inputTemplate=esignet/WalletBinding/WalletBinding, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Wallet binding VID without individualId, uniqueIdentifier=TC_ESignet_WalletBinding_41, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.PostWithBodyWithOtpGenerate.test(PostWithBodyWithOtpGenerate.java:92)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_WalletBinding_Vid_Missing_authFactorType1_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PostWithBodyWithOtpGenerate |
| Testcase Input |
| testCaseName=ESignet_WalletBinding_Vid_Missing_authFactorType1_Neg, endPoint=/v1/esignet/binding/wallet-binding, role=mobileauth, templateFields=null, input={ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Valid_Smoke_sid_vid$", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Vid_Generation_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": "$REMOVE$", "format1": "jwt", "publicKey": "$JWKKEY$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "individualId": "$ID:Generate_Perpetual_VID_Valid_Smoke_sid_vid$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendBindingOtp/SendBindingOtp", "sendOtpEndPoint": "/v1/esignet/binding/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_auth_factor_type", "errorMessage": "request.authFactorType: invalid_auth_factor_type" } ], "sendOtpResp": { "sendOtpResTemplate":"esignet/SendBindingOtp/SendBindingOtpResult" } }, inputTemplate=esignet/WalletBinding/WalletBinding, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Wallet binding VID without authFactorType1, uniqueIdentifier=TC_ESignet_WalletBinding_56, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.PostWithBodyWithOtpGenerate.test(PostWithBodyWithOtpGenerate.java:92)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_WalletBinding_Vid_Missing_format1_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PostWithBodyWithOtpGenerate |
| Testcase Input |
| testCaseName=ESignet_WalletBinding_Vid_Missing_format1_Neg, endPoint=/v1/esignet/binding/wallet-binding, role=mobileauth, templateFields=null, input={ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Valid_Smoke_sid_vid$", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Vid_Generation_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": "$REMOVE$", "publicKey": "$JWKKEY$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "individualId": "$ID:Generate_Perpetual_VID_Valid_Smoke_sid_vid$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendBindingOtp/SendBindingOtp", "sendOtpEndPoint": "/v1/esignet/binding/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_challenge_format", "errorMessage": "request.format: unsupported_challenge_format" } ], "sendOtpResp": { "sendOtpResTemplate":"esignet/SendBindingOtp/SendBindingOtpResult" } }, inputTemplate=esignet/WalletBinding/WalletBinding, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Wallet binding VID without format1, uniqueIdentifier=TC_ESignet_WalletBinding_61, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.PostWithBodyWithOtpGenerate.test(PostWithBodyWithOtpGenerate.java:92)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_WalletBinding_Vid_Null_IndividualId_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PostWithBodyWithOtpGenerate |
| Testcase Input |
| testCaseName=ESignet_WalletBinding_Vid_Null_IndividualId_Neg, endPoint=/v1/esignet/binding/wallet-binding, role=mobileauth, templateFields=null, input={ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "$TIMESTAMP$", "individualId": "null", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Vid_Generation_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "$JWKKEY$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "individualId": "$ID:Generate_Perpetual_VID_Valid_Smoke_sid_vid$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendBindingOtp/SendBindingOtp", "sendOtpEndPoint": "/v1/esignet/binding/binding-otp" } }, output={ "errors": [ { "errorCode": "IDA-MLC-009" } ], "sendOtpResp": { "sendOtpResTemplate":"esignet/SendBindingOtp/SendBindingOtpResult" } }, inputTemplate=esignet/WalletBinding/WalletBinding, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=binding_auth_failed,IDA-MLC-009, kycFields=null, description=Wallet binding VID with Null in individualId, uniqueIdentifier=TC_ESignet_WalletBinding_40, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.PostWithBodyWithOtpGenerate.test(PostWithBodyWithOtpGenerate.java:92)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_WalletBinding_Vid_Null_publicKey_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PostWithBodyWithOtpGenerate |
| Testcase Input |
| testCaseName=ESignet_WalletBinding_Vid_Null_publicKey_Neg, endPoint=/v1/esignet/binding/wallet-binding, role=mobileauth, templateFields=null, input={ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Valid_Smoke_sid_vid$", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Vid_Generation_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "null", "sendOtp":{ "requestTime": "$TIMESTAMP$", "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "individualId": "$ID:Generate_Perpetual_VID_Valid_Smoke_sid_vid$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendBindingOtp/SendBindingOtp", "sendOtpEndPoint": "/v1/esignet/binding/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_public_key", "errorMessage": "request.publicKey: invalid_public_key" } ], "sendOtpResp": { "sendOtpResTemplate":"esignet/SendBindingOtp/SendBindingOtpResult" } }, inputTemplate=esignet/WalletBinding/WalletBinding, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Wallet binding VID with Null in publicKey, uniqueIdentifier=TC_ESignet_WalletBinding_64, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.PostWithBodyWithOtpGenerate.test(PostWithBodyWithOtpGenerate.java:92)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_WalletBinding_Vid_OTP_Valid_Smoke |
| Testcase Dependency |
| [] |
| Class Name |
| PostWithBodyWithOtpGenerate |
| Testcase Input |
| testCaseName=ESignet_WalletBinding_Vid_OTP_Valid_Smoke, endPoint=/v1/esignet/binding/wallet-binding, role=mobileauth, templateFields=null, input={ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Valid_Smoke_sid_vid$", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Vid_Generation_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "$JWKKEY$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "individualId": "$ID:Generate_Perpetual_VID_Valid_Smoke_sid_vid$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendBindingOtp/SendBindingOtp", "sendOtpEndPoint": "/v1/esignet/binding/binding-otp" } }, output={ "sendOtpResp": { "sendOtpResTemplate":"esignet/SendBindingOtp/SendBindingOtpResult" } }, inputTemplate=esignet/WalletBinding/WalletBinding, outputTemplate=esignet/WalletBinding/WalletBindingResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Wallet binding VID with valid details, uniqueIdentifier=TC_ESignet_WalletBinding_04, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.PostWithBodyWithOtpGenerate.test(PostWithBodyWithOtpGenerate.java:92)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_WalletBinding_Vid_PastVal_RequestTime_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PostWithBodyWithOtpGenerate |
| Testcase Input |
| testCaseName=ESignet_WalletBinding_Vid_PastVal_RequestTime_Neg, endPoint=/v1/esignet/binding/wallet-binding, role=mobileauth, templateFields=null, input={ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "2033-11-07T06:51:30.195Z", "individualId": "$ID:Generate_Perpetual_VID_Valid_Smoke_sid_vid$", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Vid_Generation_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "$JWKKEY$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "individualId": "$ID:Generate_Perpetual_VID_Valid_Smoke_sid_vid$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendBindingOtp/SendBindingOtp", "sendOtpEndPoint": "/v1/esignet/binding/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_request", "errorMessage": "requestTime: invalid_request" } ], "sendOtpResp": { "sendOtpResTemplate":"esignet/SendBindingOtp/SendBindingOtpResult" } }, inputTemplate=esignet/WalletBinding/WalletBinding, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Wallet binding VID with past value in requestTime, uniqueIdentifier=TC_ESignet_WalletBinding_36, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.PostWithBodyWithOtpGenerate.test(PostWithBodyWithOtpGenerate.java:92)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_WalletBinding_Vid_SpaceVal_AuthFactorType_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PostWithBodyWithOtpGenerate |
| Testcase Input |
| testCaseName=ESignet_WalletBinding_Vid_SpaceVal_AuthFactorType_Neg, endPoint=/v1/esignet/binding/wallet-binding, role=mobileauth, templateFields=null, input={ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Valid_Smoke_sid_vid$", "authFactorType": " ", "challenge": "$ID:AddIdentity_Vid_Generation_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "$JWKKEY$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "individualId": "$ID:Generate_Perpetual_VID_Valid_Smoke_sid_vid$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendBindingOtp/SendBindingOtp", "sendOtpEndPoint": "/v1/esignet/binding/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_auth_factor_type", "errorMessage": "request.challengeList[0].authFactorType: invalid_auth_factor_type" } ], "sendOtpResp": { "sendOtpResTemplate":"esignet/SendBindingOtp/SendBindingOtpResult" } }, inputTemplate=esignet/WalletBinding/WalletBinding, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=invalid_auth_factor_type,invalid_auth_factor_type_format,invalid_challenge_length, kycFields=null, description=Wallet binding VID with space in AuthFactorType, uniqueIdentifier=TC_ESignet_WalletBinding_46, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.PostWithBodyWithOtpGenerate.test(PostWithBodyWithOtpGenerate.java:92)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_WalletBinding_Vid_SpaceVal_Challenge_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PostWithBodyWithOtpGenerate |
| Testcase Input |
| testCaseName=ESignet_WalletBinding_Vid_SpaceVal_Challenge_Neg, endPoint=/v1/esignet/binding/wallet-binding, role=mobileauth, templateFields=null, input={ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Valid_Smoke_sid_vid$", "authFactorType": "OTP", "challenge": " ", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "$JWKKEY$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "individualId": "$ID:Generate_Perpetual_VID_Valid_Smoke_sid_vid$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendBindingOtp/SendBindingOtp", "sendOtpEndPoint": "/v1/esignet/binding/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_challenge", "errorMessage": "request.challengeList[0].challenge: invalid_challenge" } ], "sendOtpResp": { "sendOtpResTemplate":"esignet/SendBindingOtp/SendBindingOtpResult" } }, inputTemplate=esignet/WalletBinding/WalletBinding, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=invalid_challenge, kycFields=null, description=Wallet binding VID with space in challenge, uniqueIdentifier=TC_ESignet_WalletBinding_50, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.PostWithBodyWithOtpGenerate.test(PostWithBodyWithOtpGenerate.java:92)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_WalletBinding_Vid_SpaceVal_Formate_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PostWithBodyWithOtpGenerate |
| Testcase Input |
| testCaseName=ESignet_WalletBinding_Vid_SpaceVal_Formate_Neg, endPoint=/v1/esignet/binding/wallet-binding, role=mobileauth, templateFields=null, input={ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Valid_Smoke_sid_vid$", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Vid_Generation_smoke_Pos_EMAIL$", "format": " ", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "$JWKKEY$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "individualId": "$ID:Generate_Perpetual_VID_Valid_Smoke_sid_vid$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendBindingOtp/SendBindingOtp", "sendOtpEndPoint": "/v1/esignet/binding/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_challenge_format", "errorMessage": "request.challengeList[0].format: unsupported_challenge_format" } ], "sendOtpResp": { "sendOtpResTemplate":"esignet/SendBindingOtp/SendBindingOtpResult" } }, inputTemplate=esignet/WalletBinding/WalletBinding, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=invalid_challenge_format, kycFields=null, description=Wallet binding VID with space in format, uniqueIdentifier=TC_ESignet_WalletBinding_53, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.PostWithBodyWithOtpGenerate.test(PostWithBodyWithOtpGenerate.java:92)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_WalletBinding_Vid_SpaceVal_IndividualId_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PostWithBodyWithOtpGenerate |
| Testcase Input |
| testCaseName=ESignet_WalletBinding_Vid_SpaceVal_IndividualId_Neg, endPoint=/v1/esignet/binding/wallet-binding, role=mobileauth, templateFields=null, input={ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "$TIMESTAMP$", "individualId": " ", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Vid_Generation_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "$JWKKEY$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "individualId": "$ID:Generate_Perpetual_VID_Valid_Smoke_sid_vid$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendBindingOtp/SendBindingOtp", "sendOtpEndPoint": "/v1/esignet/binding/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_individual_id" } ], "sendOtpResp": { "sendOtpResTemplate":"esignet/SendBindingOtp/SendBindingOtpResult" } }, inputTemplate=esignet/WalletBinding/WalletBinding, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Wallet binding VID with space in individualId, uniqueIdentifier=TC_ESignet_WalletBinding_42, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.PostWithBodyWithOtpGenerate.test(PostWithBodyWithOtpGenerate.java:92)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_WalletBinding_Vid_SpaceVal_authFactorType1_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PostWithBodyWithOtpGenerate |
| Testcase Input |
| testCaseName=ESignet_WalletBinding_Vid_SpaceVal_authFactorType1_Neg, endPoint=/v1/esignet/binding/wallet-binding, role=mobileauth, templateFields=null, input={ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Valid_Smoke_sid_vid$", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Vid_Generation_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": " ", "format1": "jwt", "publicKey": "$JWKKEY$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "individualId": "$ID:Generate_Perpetual_VID_Valid_Smoke_sid_vid$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendBindingOtp/SendBindingOtp", "sendOtpEndPoint": "/v1/esignet/binding/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_auth_factor_type_or_challenge_format" } ], "sendOtpResp": { "sendOtpResTemplate":"esignet/SendBindingOtp/SendBindingOtpResult" } }, inputTemplate=esignet/WalletBinding/WalletBinding, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Wallet binding VID with space in authFactorType1, uniqueIdentifier=TC_ESignet_WalletBinding_58, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.PostWithBodyWithOtpGenerate.test(PostWithBodyWithOtpGenerate.java:92)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_WalletBinding_Vid_SpaceVal_format1_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PostWithBodyWithOtpGenerate |
| Testcase Input |
| testCaseName=ESignet_WalletBinding_Vid_SpaceVal_format1_Neg, endPoint=/v1/esignet/binding/wallet-binding, role=mobileauth, templateFields=null, input={ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Valid_Smoke_sid_vid$", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Vid_Generation_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": " ", "publicKey": "$JWKKEY$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "individualId": "$ID:Generate_Perpetual_VID_Valid_Smoke_sid_vid$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendBindingOtp/SendBindingOtp", "sendOtpEndPoint": "/v1/esignet/binding/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_auth_factor_type_or_challenge_format" } ], "sendOtpResp": { "sendOtpResTemplate":"esignet/SendBindingOtp/SendBindingOtpResult" } }, inputTemplate=esignet/WalletBinding/WalletBinding, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Wallet binding VID with space in format1, uniqueIdentifier=TC_ESignet_WalletBinding_62, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.PostWithBodyWithOtpGenerate.test(PostWithBodyWithOtpGenerate.java:92)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_WalletBinding_uin_EmptyVal_AuthFactorType_Neg |
| Testcase Dependency |
| [Esignet_PartnerSelfRegistration_All_Valid_Smoke_sid, Dependent_Idrepo_AddIdentity_04, ESignet_GenerateApiKey_Valid_Smoke_sid] |
| Class Name |
| PostWithBodyWithOtpGenerate |
| Testcase Input |
| testCaseName=ESignet_WalletBinding_uin_EmptyVal_AuthFactorType_Neg, endPoint=/v1/esignet/binding/wallet-binding, role=mobileauth, templateFields=null, input={ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_UIN$", "authFactorType": "", "challenge": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "$JWKKEY$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "individualId": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendBindingOtp/SendBindingOtp", "sendOtpEndPoint": "/v1/esignet/binding/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_auth_factor_type" } ], "sendOtpResp": { "sendOtpResTemplate":"esignet/SendBindingOtp/SendBindingOtpResult" } }, inputTemplate=esignet/WalletBinding/WalletBinding, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=invalid_auth_factor_type, kycFields=null, description=Wallet binding UIN with empty value in AuthFactorType, uniqueIdentifier=TC_ESignet_WalletBinding_15, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_WalletBinding_uin_EmptyVal_Challenge_Neg |
| Testcase Dependency |
| [Esignet_PartnerSelfRegistration_All_Valid_Smoke_sid, Dependent_Idrepo_AddIdentity_04, ESignet_GenerateApiKey_Valid_Smoke_sid] |
| Class Name |
| PostWithBodyWithOtpGenerate |
| Testcase Input |
| testCaseName=ESignet_WalletBinding_uin_EmptyVal_Challenge_Neg, endPoint=/v1/esignet/binding/wallet-binding, role=mobileauth, templateFields=null, input={ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_UIN$", "authFactorType": "OTP", "challenge": "", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "$JWKKEY$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "individualId": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendBindingOtp/SendBindingOtp", "sendOtpEndPoint": "/v1/esignet/binding/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_challenge", "errorMessage": "request.challengeList[0].challenge: invalid_challenge" } ], "sendOtpResp": { "sendOtpResTemplate":"esignet/SendBindingOtp/SendBindingOtpResult" } }, inputTemplate=esignet/WalletBinding/WalletBinding, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=invalid_challenge, kycFields=null, description=Wallet binding UIN with empty value in challenge, uniqueIdentifier=TC_ESignet_WalletBinding_18, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_WalletBinding_uin_Empty_Formate_Neg |
| Testcase Dependency |
| [Esignet_PartnerSelfRegistration_All_Valid_Smoke_sid, Dependent_Idrepo_AddIdentity_04, ESignet_GenerateApiKey_Valid_Smoke_sid] |
| Class Name |
| PostWithBodyWithOtpGenerate |
| Testcase Input |
| testCaseName=ESignet_WalletBinding_uin_Empty_Formate_Neg, endPoint=/v1/esignet/binding/wallet-binding, role=mobileauth, templateFields=null, input={ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_UIN$", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_EMAIL$", "format": "", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "$JWKKEY$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "individualId": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendBindingOtp/SendBindingOtp", "sendOtpEndPoint": "/v1/esignet/binding/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_challenge_format" } ], "sendOtpResp": { "sendOtpResTemplate":"esignet/SendBindingOtp/SendBindingOtpResult" } }, inputTemplate=esignet/WalletBinding/WalletBinding, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=invalid_challenge_format, kycFields=null, description=Wallet binding UIN with empty format, uniqueIdentifier=TC_ESignet_WalletBinding_24, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_WalletBinding_uin_Empty_IndividualId_Neg |
| Testcase Dependency |
| [Esignet_PartnerSelfRegistration_All_Valid_Smoke_sid, Dependent_Idrepo_AddIdentity_04, ESignet_GenerateApiKey_Valid_Smoke_sid] |
| Class Name |
| PostWithBodyWithOtpGenerate |
| Testcase Input |
| testCaseName=ESignet_WalletBinding_uin_Empty_IndividualId_Neg, endPoint=/v1/esignet/binding/wallet-binding, role=mobileauth, templateFields=null, input={ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "$TIMESTAMP$", "individualId": "", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "$JWKKEY$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "individualId": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendBindingOtp/SendBindingOtp", "sendOtpEndPoint": "/v1/esignet/binding/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_individual_id", "errorMessage": "request.individualId: invalid_individual_id" } ], "sendOtpResp": { "sendOtpResTemplate":"esignet/SendBindingOtp/SendBindingOtpResult" } }, inputTemplate=esignet/WalletBinding/WalletBinding, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Wallet binding UIN with empty individualId, uniqueIdentifier=TC_ESignet_WalletBinding_09, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_WalletBinding_uin_Empty_authFactorType1_Neg |
| Testcase Dependency |
| [Esignet_PartnerSelfRegistration_All_Valid_Smoke_sid, Dependent_Idrepo_AddIdentity_04, ESignet_GenerateApiKey_Valid_Smoke_sid] |
| Class Name |
| PostWithBodyWithOtpGenerate |
| Testcase Input |
| testCaseName=ESignet_WalletBinding_uin_Empty_authFactorType1_Neg, endPoint=/v1/esignet/binding/wallet-binding, role=mobileauth, templateFields=null, input={ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_UIN$", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": "", "format1": "jwt", "publicKey": "$JWKKEY$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "individualId": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendBindingOtp/SendBindingOtp", "sendOtpEndPoint": "/v1/esignet/binding/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_auth_factor_type", "errorMessage": "request.authFactorType: invalid_auth_factor_type" } ], "sendOtpResp": { "sendOtpResTemplate":"esignet/SendBindingOtp/SendBindingOtpResult" } }, inputTemplate=esignet/WalletBinding/WalletBinding, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Wallet binding UIN with empty authFactorType1, uniqueIdentifier=TC_ESignet_WalletBinding_27, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_WalletBinding_uin_Empty_format1_Neg |
| Testcase Dependency |
| [Esignet_PartnerSelfRegistration_All_Valid_Smoke_sid, Dependent_Idrepo_AddIdentity_04, ESignet_GenerateApiKey_Valid_Smoke_sid] |
| Class Name |
| PostWithBodyWithOtpGenerate |
| Testcase Input |
| testCaseName=ESignet_WalletBinding_uin_Empty_format1_Neg, endPoint=/v1/esignet/binding/wallet-binding, role=mobileauth, templateFields=null, input={ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_UIN$", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": "", "publicKey": "$JWKKEY$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "individualId": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendBindingOtp/SendBindingOtp", "sendOtpEndPoint": "/v1/esignet/binding/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_challenge_format", "errorMessage": "request.format: unsupported_challenge_format" } ], "sendOtpResp": { "sendOtpResTemplate":"esignet/SendBindingOtp/SendBindingOtpResult" } }, inputTemplate=esignet/WalletBinding/WalletBinding, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Wallet binding UIN with empty format1, uniqueIdentifier=TC_ESignet_WalletBinding_30, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_WalletBinding_uin_Future_RequestTime_Neg |
| Testcase Dependency |
| [Esignet_PartnerSelfRegistration_All_Valid_Smoke_sid, Dependent_Idrepo_AddIdentity_04, ESignet_GenerateApiKey_Valid_Smoke_sid] |
| Class Name |
| PostWithBodyWithOtpGenerate |
| Testcase Input |
| testCaseName=ESignet_WalletBinding_uin_Future_RequestTime_Neg, endPoint=/v1/esignet/binding/wallet-binding, role=mobileauth, templateFields=null, input={ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "2033-11-07T06:51:30.195Z", "individualId": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_UIN$", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "$JWKKEY$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "individualId": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendBindingOtp/SendBindingOtp", "sendOtpEndPoint": "/v1/esignet/binding/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_request", "errorMessage": "requestTime: invalid_request" } ], "sendOtpResp": { "sendOtpResTemplate":"esignet/SendBindingOtp/SendBindingOtpResult" } }, inputTemplate=esignet/WalletBinding/WalletBinding, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Wallet binding UIN with future requestTime, uniqueIdentifier=TC_ESignet_WalletBinding_07, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_WalletBinding_uin_Invalid_AuthFactorType_Neg |
| Testcase Dependency |
| [Esignet_PartnerSelfRegistration_All_Valid_Smoke_sid, Dependent_Idrepo_AddIdentity_04, ESignet_GenerateApiKey_Valid_Smoke_sid] |
| Class Name |
| PostWithBodyWithOtpGenerate |
| Testcase Input |
| testCaseName=ESignet_WalletBinding_uin_Invalid_AuthFactorType_Neg, endPoint=/v1/esignet/binding/wallet-binding, role=mobileauth, templateFields=null, input={ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_UIN$", "authFactorType": "dfg5", "challenge": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "$JWKKEY$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "individualId": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendBindingOtp/SendBindingOtp", "sendOtpEndPoint": "/v1/esignet/binding/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_auth_factor_type" } ], "sendOtpResp": { "sendOtpResTemplate":"esignet/SendBindingOtp/SendBindingOtpResult" } }, inputTemplate=esignet/WalletBinding/WalletBinding, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Wallet binding UIN with invalid AuthFactorType, uniqueIdentifier=TC_ESignet_WalletBinding_13, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_WalletBinding_uin_Invalid_Challenge_Neg |
| Testcase Dependency |
| [Esignet_PartnerSelfRegistration_All_Valid_Smoke_sid, Dependent_Idrepo_AddIdentity_04, ESignet_GenerateApiKey_Valid_Smoke_sid] |
| Class Name |
| PostWithBodyWithOtpGenerate |
| Testcase Input |
| testCaseName=ESignet_WalletBinding_uin_Invalid_Challenge_Neg, endPoint=/v1/esignet/binding/wallet-binding, role=mobileauth, templateFields=null, input={ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_UIN$", "authFactorType": "OTP", "challenge": "gd5$", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "$JWKKEY$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "individualId": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendBindingOtp/SendBindingOtp", "sendOtpEndPoint": "/v1/esignet/binding/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_challenge" } ], "sendOtpResp": { "sendOtpResTemplate":"esignet/SendBindingOtp/SendBindingOtpResult" } }, inputTemplate=esignet/WalletBinding/WalletBinding, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Wallet binding UIN with invalid challenge, uniqueIdentifier=TC_ESignet_WalletBinding_17, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_WalletBinding_uin_Invalid_Formate_Neg |
| Testcase Dependency |
| [Esignet_PartnerSelfRegistration_All_Valid_Smoke_sid, Dependent_Idrepo_AddIdentity_04, ESignet_GenerateApiKey_Valid_Smoke_sid] |
| Class Name |
| PostWithBodyWithOtpGenerate |
| Testcase Input |
| testCaseName=ESignet_WalletBinding_uin_Invalid_Formate_Neg, endPoint=/v1/esignet/binding/wallet-binding, role=mobileauth, templateFields=null, input={ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_UIN$", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_EMAIL$", "format": "GT$r5", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "$JWKKEY$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "individualId": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendBindingOtp/SendBindingOtp", "sendOtpEndPoint": "/v1/esignet/binding/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_challenge_format" } ], "sendOtpResp": { "sendOtpResTemplate":"esignet/SendBindingOtp/SendBindingOtpResult" } }, inputTemplate=esignet/WalletBinding/WalletBinding, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Wallet binding UIN with invalid format, uniqueIdentifier=TC_ESignet_WalletBinding_21, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_WalletBinding_uin_Invalid_IndividualId_Neg |
| Testcase Dependency |
| [Esignet_PartnerSelfRegistration_All_Valid_Smoke_sid, Dependent_Idrepo_AddIdentity_04, ESignet_GenerateApiKey_Valid_Smoke_sid] |
| Class Name |
| PostWithBodyWithOtpGenerate |
| Testcase Input |
| testCaseName=ESignet_WalletBinding_uin_Invalid_IndividualId_Neg, endPoint=/v1/esignet/binding/wallet-binding, role=mobileauth, templateFields=null, input={ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "$TIMESTAMP$", "individualId": "$tyhg", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "$JWKKEY$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "individualId": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendBindingOtp/SendBindingOtp", "sendOtpEndPoint": "/v1/esignet/binding/binding-otp" } }, output={ "errors": [ { "errorCode": "IDA-MLC-009" } ], "sendOtpResp": { "sendOtpResTemplate":"esignet/SendBindingOtp/SendBindingOtpResult" } }, inputTemplate=esignet/WalletBinding/WalletBinding, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=binding_auth_failed,invalid_individual_id,IDA-MLC-009, kycFields=null, description=Wallet binding UIN with invalid individualId, uniqueIdentifier=TC_ESignet_WalletBinding_08, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_WalletBinding_uin_Invalid_RequestTime_Neg |
| Testcase Dependency |
| [Esignet_PartnerSelfRegistration_All_Valid_Smoke_sid, Dependent_Idrepo_AddIdentity_04, ESignet_GenerateApiKey_Valid_Smoke_sid] |
| Class Name |
| PostWithBodyWithOtpGenerate |
| Testcase Input |
| testCaseName=ESignet_WalletBinding_uin_Invalid_RequestTime_Neg, endPoint=/v1/esignet/binding/wallet-binding, role=mobileauth, templateFields=null, input={ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "asdf$", "individualId": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_UIN$", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "$JWKKEY$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "individualId": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendBindingOtp/SendBindingOtp", "sendOtpEndPoint": "/v1/esignet/binding/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_request", "errorMessage": "requestTime: invalid_request" } ], "sendOtpResp": { "sendOtpResTemplate":"esignet/SendBindingOtp/SendBindingOtpResult" } }, inputTemplate=esignet/WalletBinding/WalletBinding, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Wallet binding UIN with invalid requestTime, uniqueIdentifier=TC_ESignet_WalletBinding_05, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_WalletBinding_uin_Invalid_authFactorType1_Neg |
| Testcase Dependency |
| [Esignet_PartnerSelfRegistration_All_Valid_Smoke_sid, Dependent_Idrepo_AddIdentity_04, ESignet_GenerateApiKey_Valid_Smoke_sid] |
| Class Name |
| PostWithBodyWithOtpGenerate |
| Testcase Input |
| testCaseName=ESignet_WalletBinding_uin_Invalid_authFactorType1_Neg, endPoint=/v1/esignet/binding/wallet-binding, role=mobileauth, templateFields=null, input={ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_UIN$", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": "hy$5", "format1": "jwt", "publicKey": "$JWKKEY$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "individualId": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendBindingOtp/SendBindingOtp", "sendOtpEndPoint": "/v1/esignet/binding/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_auth_factor_type_or_challenge_format" } ], "sendOtpResp": { "sendOtpResTemplate":"esignet/SendBindingOtp/SendBindingOtpResult" } }, inputTemplate=esignet/WalletBinding/WalletBinding, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Wallet binding UIN with invalid authFactorType1, uniqueIdentifier=TC_ESignet_WalletBinding_25, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_WalletBinding_uin_Invalid_format1_Neg |
| Testcase Dependency |
| [Esignet_PartnerSelfRegistration_All_Valid_Smoke_sid, Dependent_Idrepo_AddIdentity_04, ESignet_GenerateApiKey_Valid_Smoke_sid] |
| Class Name |
| PostWithBodyWithOtpGenerate |
| Testcase Input |
| testCaseName=ESignet_WalletBinding_uin_Invalid_format1_Neg, endPoint=/v1/esignet/binding/wallet-binding, role=mobileauth, templateFields=null, input={ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_UIN$", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": "hju$5", "publicKey": "$JWKKEY$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "individualId": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendBindingOtp/SendBindingOtp", "sendOtpEndPoint": "/v1/esignet/binding/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_auth_factor_type_or_challenge_format" } ], "sendOtpResp": { "sendOtpResTemplate":"esignet/SendBindingOtp/SendBindingOtpResult" } }, inputTemplate=esignet/WalletBinding/WalletBinding, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Wallet binding UIN with invalid format1, uniqueIdentifier=TC_ESignet_WalletBinding_29, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_WalletBinding_uin_Invalid_publicKey_Neg |
| Testcase Dependency |
| [Esignet_PartnerSelfRegistration_All_Valid_Smoke_sid, Dependent_Idrepo_AddIdentity_04, ESignet_GenerateApiKey_Valid_Smoke_sid] |
| Class Name |
| PostWithBodyWithOtpGenerate |
| Testcase Input |
| testCaseName=ESignet_WalletBinding_uin_Invalid_publicKey_Neg, endPoint=/v1/esignet/binding/wallet-binding, role=mobileauth, templateFields=null, input={ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_UIN$", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "ghj$4", "sendOtp":{ "requestTime": "$TIMESTAMP$", "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "individualId": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendBindingOtp/SendBindingOtp", "sendOtpEndPoint": "/v1/esignet/binding/binding-otp" } }, output={ "errors": [ { "errorCode": "unknown_error", "errorMessage": "JSON parse error: Cannot construct instance of `java.util.LinkedHashMap` (although at least one Creator exists): no String-argument constructor/factory method to deserialize from String value (\u0027ghj$4\u0027); nested exception is com.fasterxml.jackson.databind.exc.MismatchedInputException: Cannot construct instance of `java.util.LinkedHashMap` (although at least one Creator exists): no String-argument constructor/factory method to deserialize from String value (\u0027ghj$4\u0027)\n at [Source: (PushbackInputStream); line: 1, column: 221] (through reference chain: io.mosip.idp.core.dto.RequestWrapper[\"request\"]-\u003eio.mosip.idp.core.dto.WalletBindingRequest[\"publicKey\"])" } ], "sendOtpResp": { "sendOtpResTemplate":"esignet/SendBindingOtp/SendBindingOtpResult" } }, inputTemplate=esignet/WalletBinding/WalletBinding, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Wallet binding UIN with invalid publicKey, uniqueIdentifier=TC_ESignet_WalletBinding_33, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_WalletBinding_uin_Missing_AuthFactorType_Neg |
| Testcase Dependency |
| [Esignet_PartnerSelfRegistration_All_Valid_Smoke_sid, Dependent_Idrepo_AddIdentity_04, ESignet_GenerateApiKey_Valid_Smoke_sid] |
| Class Name |
| PostWithBodyWithOtpGenerate |
| Testcase Input |
| testCaseName=ESignet_WalletBinding_uin_Missing_AuthFactorType_Neg, endPoint=/v1/esignet/binding/wallet-binding, role=mobileauth, templateFields=null, input={ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_UIN$", "authFactorType": "$REMOVE$", "challenge": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "$JWKKEY$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "individualId": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendBindingOtp/SendBindingOtp", "sendOtpEndPoint": "/v1/esignet/binding/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_auth_factor_type" } ], "sendOtpResp": { "sendOtpResTemplate":"esignet/SendBindingOtp/SendBindingOtpResult" } }, inputTemplate=esignet/WalletBinding/WalletBinding, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=invalid_auth_factor_type, kycFields=null, description=Wallet binding UIN with missing AuthFactorType, uniqueIdentifier=TC_ESignet_WalletBinding_14, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_WalletBinding_uin_Missing_Challenge_Neg |
| Testcase Dependency |
| [Esignet_PartnerSelfRegistration_All_Valid_Smoke_sid, Dependent_Idrepo_AddIdentity_04, ESignet_GenerateApiKey_Valid_Smoke_sid] |
| Class Name |
| PostWithBodyWithOtpGenerate |
| Testcase Input |
| testCaseName=ESignet_WalletBinding_uin_Missing_Challenge_Neg, endPoint=/v1/esignet/binding/wallet-binding, role=mobileauth, templateFields=null, input={ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_UIN$", "authFactorType": "OTP", "challenge": "$REMOVE$", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "$JWKKEY$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "individualId": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendBindingOtp/SendBindingOtp", "sendOtpEndPoint": "/v1/esignet/binding/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_challenge", "errorMessage": "request.challengeList[0].challenge: invalid_challenge" } ], "sendOtpResp": { "sendOtpResTemplate":"esignet/SendBindingOtp/SendBindingOtpResult" } }, inputTemplate=esignet/WalletBinding/WalletBinding, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=invalid_challenge, kycFields=null, description=Wallet binding UIN with missing challenge, uniqueIdentifier=TC_ESignet_WalletBinding_19, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_WalletBinding_uin_Missing_Formate_Neg |
| Testcase Dependency |
| [Esignet_PartnerSelfRegistration_All_Valid_Smoke_sid, Dependent_Idrepo_AddIdentity_04, ESignet_GenerateApiKey_Valid_Smoke_sid] |
| Class Name |
| PostWithBodyWithOtpGenerate |
| Testcase Input |
| testCaseName=ESignet_WalletBinding_uin_Missing_Formate_Neg, endPoint=/v1/esignet/binding/wallet-binding, role=mobileauth, templateFields=null, input={ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_UIN$", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_EMAIL$", "format": "$REMOVE$", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "$JWKKEY$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "individualId": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendBindingOtp/SendBindingOtp", "sendOtpEndPoint": "/v1/esignet/binding/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_challenge_format" } ], "sendOtpResp": { "sendOtpResTemplate":"esignet/SendBindingOtp/SendBindingOtpResult" } }, inputTemplate=esignet/WalletBinding/WalletBinding, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=invalid_challenge_format, kycFields=null, description=Wallet binding UIN with missing format, uniqueIdentifier=TC_ESignet_WalletBinding_22, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_WalletBinding_uin_Missing_IndividualId_Neg |
| Testcase Dependency |
| [Esignet_PartnerSelfRegistration_All_Valid_Smoke_sid, Dependent_Idrepo_AddIdentity_04, ESignet_GenerateApiKey_Valid_Smoke_sid] |
| Class Name |
| PostWithBodyWithOtpGenerate |
| Testcase Input |
| testCaseName=ESignet_WalletBinding_uin_Missing_IndividualId_Neg, endPoint=/v1/esignet/binding/wallet-binding, role=mobileauth, templateFields=null, input={ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "$TIMESTAMP$", "individualId": "$REMOVE$", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "$JWKKEY$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "individualId": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendBindingOtp/SendBindingOtp", "sendOtpEndPoint": "/v1/esignet/binding/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_individual_id", "errorMessage": "request.individualId: invalid_individual_id" } ], "sendOtpResp": { "sendOtpResTemplate":"esignet/SendBindingOtp/SendBindingOtpResult" } }, inputTemplate=esignet/WalletBinding/WalletBinding, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Wallet binding UIN without individualId, uniqueIdentifier=TC_ESignet_WalletBinding_11, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_WalletBinding_uin_Missing_authFactorType1_Neg |
| Testcase Dependency |
| [Esignet_PartnerSelfRegistration_All_Valid_Smoke_sid, Dependent_Idrepo_AddIdentity_04, ESignet_GenerateApiKey_Valid_Smoke_sid] |
| Class Name |
| PostWithBodyWithOtpGenerate |
| Testcase Input |
| testCaseName=ESignet_WalletBinding_uin_Missing_authFactorType1_Neg, endPoint=/v1/esignet/binding/wallet-binding, role=mobileauth, templateFields=null, input={ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_UIN$", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": "$REMOVE$", "format1": "jwt", "publicKey": "$JWKKEY$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "individualId": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendBindingOtp/SendBindingOtp", "sendOtpEndPoint": "/v1/esignet/binding/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_auth_factor_type", "errorMessage": "request.authFactorType: invalid_auth_factor_type" } ], "sendOtpResp": { "sendOtpResTemplate":"esignet/SendBindingOtp/SendBindingOtpResult" } }, inputTemplate=esignet/WalletBinding/WalletBinding, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Wallet binding UIN with missing authFactorType1, uniqueIdentifier=TC_ESignet_WalletBinding_26, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_WalletBinding_uin_Missing_format1_Neg |
| Testcase Dependency |
| [Esignet_PartnerSelfRegistration_All_Valid_Smoke_sid, Dependent_Idrepo_AddIdentity_04, ESignet_GenerateApiKey_Valid_Smoke_sid] |
| Class Name |
| PostWithBodyWithOtpGenerate |
| Testcase Input |
| testCaseName=ESignet_WalletBinding_uin_Missing_format1_Neg, endPoint=/v1/esignet/binding/wallet-binding, role=mobileauth, templateFields=null, input={ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_UIN$", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": "$REMOVE$", "publicKey": "$JWKKEY$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "individualId": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendBindingOtp/SendBindingOtp", "sendOtpEndPoint": "/v1/esignet/binding/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_challenge_format", "errorMessage": "request.format: unsupported_challenge_format" } ], "sendOtpResp": { "sendOtpResTemplate":"esignet/SendBindingOtp/SendBindingOtpResult" } }, inputTemplate=esignet/WalletBinding/WalletBinding, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Wallet binding UIN without format1, uniqueIdentifier=TC_ESignet_WalletBinding_31, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_WalletBinding_uin_Null_IndividualId_Neg |
| Testcase Dependency |
| [Esignet_PartnerSelfRegistration_All_Valid_Smoke_sid, Dependent_Idrepo_AddIdentity_04, ESignet_GenerateApiKey_Valid_Smoke_sid] |
| Class Name |
| PostWithBodyWithOtpGenerate |
| Testcase Input |
| testCaseName=ESignet_WalletBinding_uin_Null_IndividualId_Neg, endPoint=/v1/esignet/binding/wallet-binding, role=mobileauth, templateFields=null, input={ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "$TIMESTAMP$", "individualId": "null", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "$JWKKEY$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "individualId": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendBindingOtp/SendBindingOtp", "sendOtpEndPoint": "/v1/esignet/binding/binding-otp" } }, output={ "errors": [ { "errorCode": "IDA-MLC-009" } ], "sendOtpResp": { "sendOtpResTemplate":"esignet/SendBindingOtp/SendBindingOtpResult" } }, inputTemplate=esignet/WalletBinding/WalletBinding, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=binding_auth_failed,invalid_individual_id,IDA-MLC-009, kycFields=null, description=Wallet binding UIN with Null in individualId, uniqueIdentifier=TC_ESignet_WalletBinding_10, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_WalletBinding_uin_Null_publicKey_Neg |
| Testcase Dependency |
| [Esignet_PartnerSelfRegistration_All_Valid_Smoke_sid, Dependent_Idrepo_AddIdentity_04, ESignet_GenerateApiKey_Valid_Smoke_sid] |
| Class Name |
| PostWithBodyWithOtpGenerate |
| Testcase Input |
| testCaseName=ESignet_WalletBinding_uin_Null_publicKey_Neg, endPoint=/v1/esignet/binding/wallet-binding, role=mobileauth, templateFields=null, input={ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_UIN$", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "null", "sendOtp":{ "requestTime": "$TIMESTAMP$", "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "individualId": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendBindingOtp/SendBindingOtp", "sendOtpEndPoint": "/v1/esignet/binding/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_public_key", "errorMessage": "request.publicKey: invalid_public_key" } ], "sendOtpResp": { "sendOtpResTemplate":"esignet/SendBindingOtp/SendBindingOtpResult" } }, inputTemplate=esignet/WalletBinding/WalletBinding, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Wallet binding UIN with Null in publicKey, uniqueIdentifier=TC_ESignet_WalletBinding_34, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_WalletBinding_uin_OTP_Email_Valid_Smoke |
| Testcase Dependency |
| [Esignet_PartnerSelfRegistration_All_Valid_Smoke_sid, Dependent_Idrepo_AddIdentity_05, ESignet_GenerateApiKey_Valid_Smoke_sid] |
| Class Name |
| PostWithBodyWithOtpGenerate |
| Testcase Input |
| testCaseName=ESignet_WalletBinding_uin_OTP_Email_Valid_Smoke, endPoint=/v1/esignet/binding/wallet-binding, role=mobileauth, templateFields=null, input={ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Valid_Params_WOPhone_smoke_Pos_UIN$", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Valid_Params_WOPhone_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "$JWKKEY$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "individualId": "$ID:AddIdentity_Valid_Params_WOPhone_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendBindingOtp/SendBindingOtp", "sendOtpEndPoint": "/v1/esignet/binding/binding-otp" } }, output={ "sendOtpResp": { "sendOtpResTemplate":"esignet/SendBindingOtp/SendBindingOtpResult" } }, inputTemplate=esignet/WalletBinding/WalletBinding, outputTemplate=esignet/WalletBinding/WalletBindingResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Wallet binding UIN with Otp email, uniqueIdentifier=TC_ESignet_WalletBinding_03, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_WalletBinding_uin_OTP_Phone_Valid_Smoke |
| Testcase Dependency |
| [Esignet_PartnerSelfRegistration_All_Valid_Smoke_sid, ESignet_GenerateApiKey_Valid_Smoke_sid, Dependent_Idrepo_AddIdentity_06] |
| Class Name |
| PostWithBodyWithOtpGenerate |
| Testcase Input |
| testCaseName=ESignet_WalletBinding_uin_OTP_Phone_Valid_Smoke, endPoint=/v1/esignet/binding/wallet-binding, role=mobileauth, templateFields=null, input={ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Valid_Params_WOEmail_smoke_Pos_UIN$", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Valid_Params_WOEmail_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "$JWKKEY$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "individualId": "$ID:AddIdentity_Valid_Params_WOEmail_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendBindingOtp/SendBindingOtp", "sendOtpEndPoint": "/v1/esignet/binding/binding-otp" } }, output={ "sendOtpResp": { "sendOtpResTemplate":"esignet/SendBindingOtp/SendBindingOtpResult" } }, inputTemplate=esignet/WalletBinding/WalletBinding, outputTemplate=esignet/WalletBinding/WalletBindingResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Wallet binding UIN with Otp phone, uniqueIdentifier=TC_ESignet_WalletBinding_02, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_WalletBinding_uin_OTP_Valid_Smoke |
| Testcase Dependency |
| [Esignet_PartnerSelfRegistration_All_Valid_Smoke_sid, Dependent_Idrepo_AddIdentity_04, ESignet_GenerateApiKey_Valid_Smoke_sid] |
| Class Name |
| PostWithBodyWithOtpGenerate |
| Testcase Input |
| testCaseName=ESignet_WalletBinding_uin_OTP_Valid_Smoke, endPoint=/v1/esignet/binding/wallet-binding, role=mobileauth, templateFields=null, input={ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_UIN$", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "$JWKKEY$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "individualId": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendBindingOtp/SendBindingOtp", "sendOtpEndPoint": "/v1/esignet/binding/binding-otp" } }, output={ "sendOtpResp": { "sendOtpResTemplate":"esignet/SendBindingOtp/SendBindingOtpResult" } }, inputTemplate=esignet/WalletBinding/WalletBinding, outputTemplate=esignet/WalletBinding/WalletBindingResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Wallet binding UIN with valid details, uniqueIdentifier=TC_ESignet_WalletBinding_01, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_WalletBinding_uin_PastVal_RequestTime_Neg |
| Testcase Dependency |
| [Esignet_PartnerSelfRegistration_All_Valid_Smoke_sid, Dependent_Idrepo_AddIdentity_04, ESignet_GenerateApiKey_Valid_Smoke_sid] |
| Class Name |
| PostWithBodyWithOtpGenerate |
| Testcase Input |
| testCaseName=ESignet_WalletBinding_uin_PastVal_RequestTime_Neg, endPoint=/v1/esignet/binding/wallet-binding, role=mobileauth, templateFields=null, input={ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "2033-11-07T06:51:30.195Z", "individualId": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_UIN$", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "$JWKKEY$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "individualId": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendBindingOtp/SendBindingOtp", "sendOtpEndPoint": "/v1/esignet/binding/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_request", "errorMessage": "requestTime: invalid_request" } ], "sendOtpResp": { "sendOtpResTemplate":"esignet/SendBindingOtp/SendBindingOtpResult" } }, inputTemplate=esignet/WalletBinding/WalletBinding, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Wallet binding UIN with past value in requestTime, uniqueIdentifier=TC_ESignet_WalletBinding_06, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_WalletBinding_uin_SpaceVal_AuthFactorType_Neg |
| Testcase Dependency |
| [Esignet_PartnerSelfRegistration_All_Valid_Smoke_sid, Dependent_Idrepo_AddIdentity_04, ESignet_GenerateApiKey_Valid_Smoke_sid] |
| Class Name |
| PostWithBodyWithOtpGenerate |
| Testcase Input |
| testCaseName=ESignet_WalletBinding_uin_SpaceVal_AuthFactorType_Neg, endPoint=/v1/esignet/binding/wallet-binding, role=mobileauth, templateFields=null, input={ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_UIN$", "authFactorType": " ", "challenge": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "$JWKKEY$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "individualId": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendBindingOtp/SendBindingOtp", "sendOtpEndPoint": "/v1/esignet/binding/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_auth_factor_type", "errorMessage": "request.challengeList[0].authFactorType: invalid_auth_factor_type" } ], "sendOtpResp": { "sendOtpResTemplate":"esignet/SendBindingOtp/SendBindingOtpResult" } }, inputTemplate=esignet/WalletBinding/WalletBinding, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=invalid_auth_factor_type, kycFields=null, description=Wallet binding UIN with space in AuthFactorType, uniqueIdentifier=TC_ESignet_WalletBinding_16, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_WalletBinding_uin_SpaceVal_Challenge_Neg |
| Testcase Dependency |
| [Esignet_PartnerSelfRegistration_All_Valid_Smoke_sid, Dependent_Idrepo_AddIdentity_04, ESignet_GenerateApiKey_Valid_Smoke_sid] |
| Class Name |
| PostWithBodyWithOtpGenerate |
| Testcase Input |
| testCaseName=ESignet_WalletBinding_uin_SpaceVal_Challenge_Neg, endPoint=/v1/esignet/binding/wallet-binding, role=mobileauth, templateFields=null, input={ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_UIN$", "authFactorType": "OTP", "challenge": " ", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "$JWKKEY$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "individualId": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendBindingOtp/SendBindingOtp", "sendOtpEndPoint": "/v1/esignet/binding/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_challenge", "errorMessage": "request.challengeList[0].challenge: invalid_challenge" } ], "sendOtpResp": { "sendOtpResTemplate":"esignet/SendBindingOtp/SendBindingOtpResult" } }, inputTemplate=esignet/WalletBinding/WalletBinding, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=invalid_challenge, kycFields=null, description=Wallet binding UIN with space in challenge, uniqueIdentifier=TC_ESignet_WalletBinding_20, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_WalletBinding_uin_SpaceVal_Formate_Neg |
| Testcase Dependency |
| [Esignet_PartnerSelfRegistration_All_Valid_Smoke_sid, Dependent_Idrepo_AddIdentity_04, ESignet_GenerateApiKey_Valid_Smoke_sid] |
| Class Name |
| PostWithBodyWithOtpGenerate |
| Testcase Input |
| testCaseName=ESignet_WalletBinding_uin_SpaceVal_Formate_Neg, endPoint=/v1/esignet/binding/wallet-binding, role=mobileauth, templateFields=null, input={ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_UIN$", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_EMAIL$", "format": " ", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "$JWKKEY$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "individualId": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendBindingOtp/SendBindingOtp", "sendOtpEndPoint": "/v1/esignet/binding/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_challenge_format", "errorMessage": "request.challengeList[0].format: unsupported_challenge_format" } ], "sendOtpResp": { "sendOtpResTemplate":"esignet/SendBindingOtp/SendBindingOtpResult" } }, inputTemplate=esignet/WalletBinding/WalletBinding, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=invalid_challenge_format, kycFields=null, description=Wallet binding UIN with space in format, uniqueIdentifier=TC_ESignet_WalletBinding_23, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_WalletBinding_uin_SpaceVal_IndividualId_Neg |
| Testcase Dependency |
| [Esignet_PartnerSelfRegistration_All_Valid_Smoke_sid, Dependent_Idrepo_AddIdentity_04, ESignet_GenerateApiKey_Valid_Smoke_sid] |
| Class Name |
| PostWithBodyWithOtpGenerate |
| Testcase Input |
| testCaseName=ESignet_WalletBinding_uin_SpaceVal_IndividualId_Neg, endPoint=/v1/esignet/binding/wallet-binding, role=mobileauth, templateFields=null, input={ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "$TIMESTAMP$", "individualId": " ", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "$JWKKEY$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "individualId": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendBindingOtp/SendBindingOtp", "sendOtpEndPoint": "/v1/esignet/binding/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_individual_id" } ], "sendOtpResp": { "sendOtpResTemplate":"esignet/SendBindingOtp/SendBindingOtpResult" } }, inputTemplate=esignet/WalletBinding/WalletBinding, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Wallet binding UIN with space in individualId, uniqueIdentifier=TC_ESignet_WalletBinding_12, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_WalletBinding_uin_SpaceVal_authFactorType1_Neg |
| Testcase Dependency |
| [Esignet_PartnerSelfRegistration_All_Valid_Smoke_sid, Dependent_Idrepo_AddIdentity_04, ESignet_GenerateApiKey_Valid_Smoke_sid] |
| Class Name |
| PostWithBodyWithOtpGenerate |
| Testcase Input |
| testCaseName=ESignet_WalletBinding_uin_SpaceVal_authFactorType1_Neg, endPoint=/v1/esignet/binding/wallet-binding, role=mobileauth, templateFields=null, input={ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_UIN$", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": " ", "format1": "jwt", "publicKey": "$JWKKEY$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "individualId": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendBindingOtp/SendBindingOtp", "sendOtpEndPoint": "/v1/esignet/binding/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_auth_factor_type_or_challenge_format" } ], "sendOtpResp": { "sendOtpResTemplate":"esignet/SendBindingOtp/SendBindingOtpResult" } }, inputTemplate=esignet/WalletBinding/WalletBinding, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Wallet binding UIN with space in authFactorType1, uniqueIdentifier=TC_ESignet_WalletBinding_28, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_WalletBinding_uin_SpaceVal_format1_Neg |
| Testcase Dependency |
| [Esignet_PartnerSelfRegistration_All_Valid_Smoke_sid, Dependent_Idrepo_AddIdentity_04, ESignet_GenerateApiKey_Valid_Smoke_sid] |
| Class Name |
| PostWithBodyWithOtpGenerate |
| Testcase Input |
| testCaseName=ESignet_WalletBinding_uin_SpaceVal_format1_Neg, endPoint=/v1/esignet/binding/wallet-binding, role=mobileauth, templateFields=null, input={ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_UIN$", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": " ", "publicKey": "$JWKKEY$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "individualId": "$ID:AddIdentity_Valid_Params_BindOtp_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendBindingOtp/SendBindingOtp", "sendOtpEndPoint": "/v1/esignet/binding/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_auth_factor_type_or_challenge_format" } ], "sendOtpResp": { "sendOtpResTemplate":"esignet/SendBindingOtp/SendBindingOtpResult" } }, inputTemplate=esignet/WalletBinding/WalletBinding, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Wallet binding UIN with space in format1, uniqueIdentifier=TC_ESignet_WalletBinding_32, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_OAuthDetailsRequest_LinkAuth_Consent_EmptyClaim_Valid_Smoke_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_OAuthDetailsRequest_LinkAuth_Consent_EmptyClaim_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:linked-wallet", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en" }, output={ }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestNullClaims, outputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Oauthdetails request with linkAuth consent and empty claim, uniqueIdentifier=null, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_OAuthDetailsRequest_LinkAuth_Consent_NoClaim_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_OAuthDetailsRequest_LinkAuth_Consent_NoClaim_Neg, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:linked-wallet", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en" }, output={ }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestNoClaims, outputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Oauthdetails request with linkAuth consent and no claims, uniqueIdentifier=null, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_OAuthDetailsRequest_LinkAuth_Consent_Valid_OnlyOptionalClaimAsRequested_AcceptedClaim_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_OAuthDetailsRequest_LinkAuth_Consent_Valid_OnlyOptionalClaimAsRequested_AcceptedClaim_sid, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:linked-wallet", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en" }, output={ }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestOptionalClaim, outputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Oauthdetails request with linkAuth consent with valid details, uniqueIdentifier=null, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_OAuthDetailsRequest_LinkAuth_Consent_Valid_Smoke_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_OAuthDetailsRequest_LinkAuth_Consent_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:linked-wallet", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en" }, output={ }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Oauthdetails request with linkAuth consent valid details, uniqueIdentifier=null, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_OAuthDetailsRequest_LinkAuth_Consent_Valid_forAcceptedClaims_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_OAuthDetailsRequest_LinkAuth_Consent_Valid_forAcceptedClaims_sid, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:linked-wallet", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en" }, output={ }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Oauthdetails request with linkAuth consent with valid details, uniqueIdentifier=null, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_OAuthDetailsRequest_LinkAuth_Consent_Valid_forOnlyEssentialClaims_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_OAuthDetailsRequest_LinkAuth_Consent_Valid_forOnlyEssentialClaims_sid, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:linked-wallet", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en" }, output={ }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Oauthdetails request with linkAuth consent with valid details, uniqueIdentifier=null, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_OAuthDetailsRequest_LinkAuth_Consent_Valid_forOnlyOptionalClaims_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_OAuthDetailsRequest_LinkAuth_Consent_Valid_forOnlyOptionalClaims_sid, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:linked-wallet", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en" }, output={ }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Oauthdetails request with linkAuth consent with valid details, uniqueIdentifier=null, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_OAuthDetailsRequest_LinkAuth_Consent_Valid_forPartialEssential_OptionalClaims_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_OAuthDetailsRequest_LinkAuth_Consent_Valid_forPartialEssential_OptionalClaims_sid, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:linked-wallet", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en" }, output={ }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Oauthdetails request with linkAuth consent with valid details, uniqueIdentifier=null, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_OAuthDetailsRequest_LinkAuth_Consent_Valid_null_asEssentialClaims_AcceptedClaim_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_OAuthDetailsRequest_LinkAuth_Consent_Valid_null_asEssentialClaims_AcceptedClaim_sid, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:linked-wallet", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en" }, output={ }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Oauthdetails request with linkAuth consent with valid details, uniqueIdentifier=null, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_OAuthDetailsRequest_LinkAuth_Consent_Valid_without_AcceptedClaim_IfOnlyOptionalRequested_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_OAuthDetailsRequest_LinkAuth_Consent_Valid_without_AcceptedClaim_IfOnlyOptionalRequested_sid, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:linked-wallet", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en" }, output={ }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestOptionalClaim, outputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Oauthdetails request with linkAuth consent with valid details, uniqueIdentifier=null, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_OAuthDetailsRequest_LinkAuth_Consent_vid_Valid_Smoke_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_OAuthDetailsRequest_LinkAuth_Consent_vid_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:linked-wallet", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en" }, output={ }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Oauthdetails request with linkAuth consent valid details, uniqueIdentifier=null, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_GenerateLinkCode_Consent_Vid_all_Valid_Smoke_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_GenerateLinkCode_Consent_Vid_all_Valid_Smoke_sid, endPoint=/v1/esignet/linked-authorization/link-code, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_LinkAuth_Consent_vid_Valid_Smoke_sid_transactionId$" }, output={ }, inputTemplate=esignet/GenerateLinkCode/GenerateLinkCode, outputTemplate=esignet/GenerateLinkCode/GenerateLinkCodeResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generate LinkCode consent VID with all valid details, uniqueIdentifier=TC_ESignet_GenerateLinkCodeConsent_02, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:101)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_GenerateLinkCode_Consent_uin_EmptyClaim_all_Valid_Smoke_sid |
| Testcase Dependency |
| [ESignet_OAuthDetailsRequest_LinkAuth_Consent_EmptyClaim_Valid_Smoke_sid, TC_ESignet_CreateOIDCClient_01] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_GenerateLinkCode_Consent_uin_EmptyClaim_all_Valid_Smoke_sid, endPoint=/v1/esignet/linked-authorization/link-code, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_LinkAuth_Consent_EmptyClaim_Valid_Smoke_sid_transactionId$" }, output={ }, inputTemplate=esignet/GenerateLinkCode/GenerateLinkCode, outputTemplate=esignet/GenerateLinkCode/GenerateLinkCodeResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generate LinkCode consent UIN with empty claim all valid details, uniqueIdentifier=TC_ESignet_GenerateLinkCodeConsent_03, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_GenerateLinkCode_Consent_uin_OnlyOptionalClaimAsRequested_AcceptedClaim_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_GenerateLinkCode_Consent_uin_OnlyOptionalClaimAsRequested_AcceptedClaim_sid, endPoint=/v1/esignet/linked-authorization/link-code, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_LinkAuth_Consent_Valid_OnlyOptionalClaimAsRequested_AcceptedClaim_sid_transactionId$" }, output={ }, inputTemplate=esignet/GenerateLinkCode/GenerateLinkCode, outputTemplate=esignet/GenerateLinkCode/GenerateLinkCodeResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generate LinkCode consent UIN for Only OptionalClaim As Requestedclaim, uniqueIdentifier=TC_ESignet_GenerateLinkCodeConsent_08, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_GenerateLinkCode_Consent_uin_all_Valid_Smoke_sid |
| Testcase Dependency |
| [ESignet_OAuthDetailsRequest_LinkAuth_Consent_Valid_Smoke_sid, TC_ESignet_CreateOIDCClient_01] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_GenerateLinkCode_Consent_uin_all_Valid_Smoke_sid, endPoint=/v1/esignet/linked-authorization/link-code, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_LinkAuth_Consent_Valid_Smoke_sid_transactionId$" }, output={ }, inputTemplate=esignet/GenerateLinkCode/GenerateLinkCode, outputTemplate=esignet/GenerateLinkCode/GenerateLinkCodeResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generate LinkCode consent UIN with all valid details, uniqueIdentifier=TC_ESignet_GenerateLinkCodeConsent_01, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_GenerateLinkCode_Consent_uin_forAcceptedClaims_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_GenerateLinkCode_Consent_uin_forAcceptedClaims_sid, endPoint=/v1/esignet/linked-authorization/link-code, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_LinkAuth_Consent_Valid_forAcceptedClaims_sid_transactionId$" }, output={ }, inputTemplate=esignet/GenerateLinkCode/GenerateLinkCode, outputTemplate=esignet/GenerateLinkCode/GenerateLinkCodeResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generate LinkCode consent UIN for accepted claims, uniqueIdentifier=TC_ESignet_GenerateLinkCodeConsent_04, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_GenerateLinkCode_Consent_uin_forNullEssentialClaim_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_GenerateLinkCode_Consent_uin_forNullEssentialClaim_sid, endPoint=/v1/esignet/linked-authorization/link-code, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_LinkAuth_Consent_Valid_null_asEssentialClaims_AcceptedClaim_sid_transactionId$" }, output={ }, inputTemplate=esignet/GenerateLinkCode/GenerateLinkCode, outputTemplate=esignet/GenerateLinkCode/GenerateLinkCodeResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generate LinkCode consent UIN for Null as EssentialClaim, uniqueIdentifier=TC_ESignet_GenerateLinkCodeConsent_07, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_GenerateLinkCode_Consent_uin_forOnlyEssentialClaim_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_GenerateLinkCode_Consent_uin_forOnlyEssentialClaim_sid, endPoint=/v1/esignet/linked-authorization/link-code, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_LinkAuth_Consent_Valid_forOnlyEssentialClaims_sid_transactionId$" }, output={ }, inputTemplate=esignet/GenerateLinkCode/GenerateLinkCode, outputTemplate=esignet/GenerateLinkCode/GenerateLinkCodeResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generate LinkCode consent UIN for OnlyEssentialClaim, uniqueIdentifier=TC_ESignet_GenerateLinkCodeConsent_06, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_GenerateLinkCode_Consent_uin_forOptionalClaim_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_GenerateLinkCode_Consent_uin_forOptionalClaim_sid, endPoint=/v1/esignet/linked-authorization/link-code, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_LinkAuth_Consent_Valid_forOnlyOptionalClaims_sid_transactionId$" }, output={ }, inputTemplate=esignet/GenerateLinkCode/GenerateLinkCode, outputTemplate=esignet/GenerateLinkCode/GenerateLinkCodeResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generate LinkCode consent UIN for optional cliams, uniqueIdentifier=TC_ESignet_GenerateLinkCodeConsent_05, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_GenerateLinkCode_Consent_uin_forPartialEssentialClaim_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_GenerateLinkCode_Consent_uin_forPartialEssentialClaim_sid, endPoint=/v1/esignet/linked-authorization/link-code, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_LinkAuth_Consent_Valid_forPartialEssential_OptionalClaims_sid_transactionId$" }, output={ }, inputTemplate=esignet/GenerateLinkCode/GenerateLinkCode, outputTemplate=esignet/GenerateLinkCode/GenerateLinkCodeResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generate LinkCode consent UIN for optional cliams, uniqueIdentifier=TC_ESignet_GenerateLinkCodeConsent_05, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_GenerateLinkCode_Consent_uin_without_AcceptedClaim_IfOnlyOptionalRequested_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_GenerateLinkCode_Consent_uin_without_AcceptedClaim_IfOnlyOptionalRequested_sid, endPoint=/v1/esignet/linked-authorization/link-code, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_LinkAuth_Consent_Valid_without_AcceptedClaim_IfOnlyOptionalRequested_sid_transactionId$" }, output={ }, inputTemplate=esignet/GenerateLinkCode/GenerateLinkCode, outputTemplate=esignet/GenerateLinkCode/GenerateLinkCodeResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generate LinkCode consent UIN without AcceptedClaim IfOnlyOptionalRequested, uniqueIdentifier=TC_ESignet_GenerateLinkCodeConsent_09, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_LinkTransaction_Consent_Vid_all_Valid_Smoke_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_LinkTransaction_Consent_Vid_all_Valid_Smoke_sid, endPoint=/v1/esignet/linked-authorization/link-transaction, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "linkCode": "$ID:GenerateLinkCode_Consent_Vid_all_Valid_Smoke_sid_linkCode$" }, output={ }, inputTemplate=esignet/LinkTransaction/LinkTransaction, outputTemplate=esignet/LinkTransaction/LinkTransactionResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Link transaction consent VID with all valid details, uniqueIdentifier=TC_ESignet_LinkTransactionConsent_02, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:101)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_LinkTransaction_Consent_uin_EmptyClaim_all_Valid_Smoke_sid |
| Testcase Dependency |
| [TC_ESignet_GenerateLinkCodeConsent_03, ESignet_OAuthDetailsRequest_LinkAuth_Consent_EmptyClaim_Valid_Smoke_sid, TC_ESignet_CreateOIDCClient_01] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_LinkTransaction_Consent_uin_EmptyClaim_all_Valid_Smoke_sid, endPoint=/v1/esignet/linked-authorization/link-transaction, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "linkCode": "$ID:GenerateLinkCode_Consent_uin_EmptyClaim_all_Valid_Smoke_sid_linkCode$" }, output={ }, inputTemplate=esignet/LinkTransaction/LinkTransaction, outputTemplate=esignet/LinkTransaction/LinkTransactionResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Link transaction consent UIN with empty claim, uniqueIdentifier=TC_ESignet_LinkTransactionConsent_03, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_LinkTransaction_Consent_uin_OnlyOptionalClaimAsRequested_AcceptedClaim_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_LinkTransaction_Consent_uin_OnlyOptionalClaimAsRequested_AcceptedClaim_sid, endPoint=/v1/esignet/linked-authorization/link-transaction, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "linkCode": "$ID:GenerateLinkCode_Consent_uin_OnlyOptionalClaimAsRequested_AcceptedClaim_sid_linkCode$" }, output={ }, inputTemplate=esignet/LinkTransaction/LinkTransaction, outputTemplate=esignet/LinkTransaction/LinkTransactionResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Link transaction consent UIN for OnlyOptionalClaimAsRequested, uniqueIdentifier=TC_ESignet_LinkTransactionConsent_08, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_LinkTransaction_Consent_uin_all_Valid_Smoke_sid |
| Testcase Dependency |
| [TC_ESignet_GenerateLinkCodeConsent_01, ESignet_OAuthDetailsRequest_LinkAuth_Consent_Valid_Smoke_sid, TC_ESignet_CreateOIDCClient_01] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_LinkTransaction_Consent_uin_all_Valid_Smoke_sid, endPoint=/v1/esignet/linked-authorization/link-transaction, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "linkCode": "$ID:GenerateLinkCode_Consent_uin_all_Valid_Smoke_sid_linkCode$" }, output={ }, inputTemplate=esignet/LinkTransaction/LinkTransaction, outputTemplate=esignet/LinkTransaction/LinkTransactionResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Link transaction consent UIN with all valid details, uniqueIdentifier=TC_ESignet_LinkTransactionConsent_01, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_LinkTransaction_Consent_uin_forAcceptedClaims_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_LinkTransaction_Consent_uin_forAcceptedClaims_sid, endPoint=/v1/esignet/linked-authorization/link-transaction, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "linkCode": "$ID:GenerateLinkCode_Consent_uin_forAcceptedClaims_sid_linkCode$" }, output={ }, inputTemplate=esignet/LinkTransaction/LinkTransaction, outputTemplate=esignet/LinkTransaction/LinkTransactionResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Link transaction consent UIN for accepted claims, uniqueIdentifier=TC_ESignet_LinkTransactionConsent_04, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_LinkTransaction_Consent_uin_forNullAsEssentialClaims_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_LinkTransaction_Consent_uin_forNullAsEssentialClaims_sid, endPoint=/v1/esignet/linked-authorization/link-transaction, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "linkCode": "$ID:GenerateLinkCode_Consent_uin_forNullEssentialClaim_sid_linkCode$" }, output={ }, inputTemplate=esignet/LinkTransaction/LinkTransaction, outputTemplate=esignet/LinkTransaction/LinkTransactionResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Link transaction consent UIN for Only EssentialClaims, uniqueIdentifier=TC_ESignet_LinkTransactionConsent_07, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_LinkTransaction_Consent_uin_forOnlyEssentialClaims_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_LinkTransaction_Consent_uin_forOnlyEssentialClaims_sid, endPoint=/v1/esignet/linked-authorization/link-transaction, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "linkCode": "$ID:GenerateLinkCode_Consent_uin_forOnlyEssentialClaim_sid_linkCode$" }, output={ }, inputTemplate=esignet/LinkTransaction/LinkTransaction, outputTemplate=esignet/LinkTransaction/LinkTransactionResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Link transaction consent UIN for Only EssentialClaims, uniqueIdentifier=TC_ESignet_LinkTransactionConsent_06, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_LinkTransaction_Consent_uin_forOptionalClaims_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_LinkTransaction_Consent_uin_forOptionalClaims_sid, endPoint=/v1/esignet/linked-authorization/link-transaction, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "linkCode": "$ID:GenerateLinkCode_Consent_uin_forOptionalClaim_sid_linkCode$" }, output={ }, inputTemplate=esignet/LinkTransaction/LinkTransaction, outputTemplate=esignet/LinkTransaction/LinkTransactionResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Link transaction consent UIN for optional claims, uniqueIdentifier=TC_ESignet_LinkTransactionConsent_05, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_LinkTransaction_Consent_uin_forPartialEssentialOptionalClaims_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_LinkTransaction_Consent_uin_forPartialEssentialOptionalClaims_sid, endPoint=/v1/esignet/linked-authorization/link-transaction, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "linkCode": "$ID:GenerateLinkCode_Consent_uin_forPartialEssentialClaim_sid_linkCode$" }, output={ }, inputTemplate=esignet/LinkTransaction/LinkTransaction, outputTemplate=esignet/LinkTransaction/LinkTransactionResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Link transaction consent UIN for optional claims, uniqueIdentifier=TC_ESignet_LinkTransactionConsent_05, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_LinkTransaction_Consent_uin_without_AcceptedClaim_IfOnlyOptionalRequested_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_LinkTransaction_Consent_uin_without_AcceptedClaim_IfOnlyOptionalRequested_sid, endPoint=/v1/esignet/linked-authorization/link-transaction, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "linkCode": "$ID:GenerateLinkCode_Consent_uin_without_AcceptedClaim_IfOnlyOptionalRequested_sid_linkCode$" }, output={ }, inputTemplate=esignet/LinkTransaction/LinkTransaction, outputTemplate=esignet/LinkTransaction/LinkTransactionResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Link transaction consent UIN without_AcceptedClaim_IfOnlyOptionalRequested, uniqueIdentifier=TC_ESignet_LinkTransactionConsent_09, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_GetLinkStatus_Consent_Vid_all_Valid_Smoke |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=ESignet_GetLinkStatus_Consent_Vid_all_Valid_Smoke, endPoint=/v1/esignet/linked-authorization/link-status, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_LinkAuth_Consent_vid_Valid_Smoke_sid_transactionId$", "linkCode": "$ID:GenerateLinkCode_Consent_Vid_all_Valid_Smoke_sid_linkCode$" }, output={ }, inputTemplate=esignet/GetLinkStatus/GetLinkStatus, outputTemplate=esignet/GetLinkStatus/GetLinkStatusResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Get link status consent VID with all valid details, uniqueIdentifier=TC_ESignet_GetLinkStatusConsent_02, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePost.test(SimplePost.java:98)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_GetLinkStatus_Consent_uin_EmptyClaim_all_Valid_Smoke |
| Testcase Dependency |
| [ESignet_OAuthDetailsRequest_LinkAuth_Consent_EmptyClaim_Valid_Smoke_sid, TC_ESignet_CreateOIDCClient_01, TC_ESignet_GenerateLinkCodeConsent_03] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=ESignet_GetLinkStatus_Consent_uin_EmptyClaim_all_Valid_Smoke, endPoint=/v1/esignet/linked-authorization/link-status, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_LinkAuth_Consent_EmptyClaim_Valid_Smoke_sid_transactionId$", "linkCode": "$ID:GenerateLinkCode_Consent_uin_EmptyClaim_all_Valid_Smoke_sid_linkCode$" }, output={ }, inputTemplate=esignet/GetLinkStatus/GetLinkStatus, outputTemplate=esignet/GetLinkStatus/GetLinkStatusResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Get link status consent UIN with empty claim, uniqueIdentifier=TC_ESignet_GetLinkStatusConsent_03, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_GetLinkStatus_Consent_uin_OnlyOptionalClaimAsRequested_AcceptedClaim |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=ESignet_GetLinkStatus_Consent_uin_OnlyOptionalClaimAsRequested_AcceptedClaim, endPoint=/v1/esignet/linked-authorization/link-status, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_LinkAuth_Consent_Valid_OnlyOptionalClaimAsRequested_AcceptedClaim_sid_transactionId$", "linkCode": "$ID:GenerateLinkCode_Consent_uin_OnlyOptionalClaimAsRequested_AcceptedClaim_sid_linkCode$" }, output={ }, inputTemplate=esignet/GetLinkStatus/GetLinkStatus, outputTemplate=esignet/GetLinkStatus/GetLinkStatusResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Get link status consent UIN for OnlyOptionalClaimAsRequested, uniqueIdentifier=TC_ESignet_GetLinkStatusConsent_09, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_GetLinkStatus_Consent_uin_all_Valid_Smoke |
| Testcase Dependency |
| [ESignet_OAuthDetailsRequest_LinkAuth_Consent_Valid_Smoke_sid, TC_ESignet_CreateOIDCClient_01, TC_ESignet_GenerateLinkCodeConsent_01] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=ESignet_GetLinkStatus_Consent_uin_all_Valid_Smoke, endPoint=/v1/esignet/linked-authorization/link-status, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_LinkAuth_Consent_Valid_Smoke_sid_transactionId$", "linkCode": "$ID:GenerateLinkCode_Consent_uin_all_Valid_Smoke_sid_linkCode$" }, output={ }, inputTemplate=esignet/GetLinkStatus/GetLinkStatus, outputTemplate=esignet/GetLinkStatus/GetLinkStatusResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Get link status consent UIN with all valid details, uniqueIdentifier=TC_ESignet_GetLinkStatusConsent_01, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_GetLinkStatus_Consent_uin_forAcceptedClaims |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=ESignet_GetLinkStatus_Consent_uin_forAcceptedClaims, endPoint=/v1/esignet/linked-authorization/link-status, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_LinkAuth_Consent_Valid_forAcceptedClaims_sid_transactionId$", "linkCode": "$ID:GenerateLinkCode_Consent_uin_forAcceptedClaims_sid_linkCode$" }, output={ }, inputTemplate=esignet/GetLinkStatus/GetLinkStatus, outputTemplate=esignet/GetLinkStatus/GetLinkStatusResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Get link status consent UIN for accepted claims, uniqueIdentifier=TC_ESignet_GetLinkStatusConsent_04, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_GetLinkStatus_Consent_uin_forNullAsEssentialClaims |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=ESignet_GetLinkStatus_Consent_uin_forNullAsEssentialClaims, endPoint=/v1/esignet/linked-authorization/link-status, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_LinkAuth_Consent_Valid_null_asEssentialClaims_AcceptedClaim_sid_transactionId$", "linkCode": "$ID:GenerateLinkCode_Consent_uin_forNullEssentialClaim_sid_linkCode$" }, output={ }, inputTemplate=esignet/GetLinkStatus/GetLinkStatus, outputTemplate=esignet/GetLinkStatus/GetLinkStatusResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Get link status consent UIN for null as Essential Claims, uniqueIdentifier=TC_ESignet_GetLinkStatusConsent_08, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_GetLinkStatus_Consent_uin_forOnlyEssentialClaims |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=ESignet_GetLinkStatus_Consent_uin_forOnlyEssentialClaims, endPoint=/v1/esignet/linked-authorization/link-status, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_LinkAuth_Consent_Valid_forOnlyEssentialClaims_sid_transactionId$", "linkCode": "$ID:GenerateLinkCode_Consent_uin_forOnlyEssentialClaim_sid_linkCode$" }, output={ }, inputTemplate=esignet/GetLinkStatus/GetLinkStatus, outputTemplate=esignet/GetLinkStatus/GetLinkStatusResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Get link status consent UIN for Only Essential Claims, uniqueIdentifier=TC_ESignet_GetLinkStatusConsent_07, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_GetLinkStatus_Consent_uin_forOptionalClaims |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=ESignet_GetLinkStatus_Consent_uin_forOptionalClaims, endPoint=/v1/esignet/linked-authorization/link-status, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_LinkAuth_Consent_Valid_forOnlyOptionalClaims_sid_transactionId$", "linkCode": "$ID:GenerateLinkCode_Consent_uin_forOptionalClaim_sid_linkCode$" }, output={ }, inputTemplate=esignet/GetLinkStatus/GetLinkStatus, outputTemplate=esignet/GetLinkStatus/GetLinkStatusResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Get link status consent UIN for optional claims, uniqueIdentifier=TC_ESignet_GetLinkStatusConsent_05, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_GetLinkStatus_Consent_uin_forPartialEssentialOptionalClaims |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=ESignet_GetLinkStatus_Consent_uin_forPartialEssentialOptionalClaims, endPoint=/v1/esignet/linked-authorization/link-status, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_LinkAuth_Consent_Valid_forPartialEssential_OptionalClaims_sid_transactionId$", "linkCode": "$ID:GenerateLinkCode_Consent_uin_forPartialEssentialClaim_sid_linkCode$" }, output={ }, inputTemplate=esignet/GetLinkStatus/GetLinkStatus, outputTemplate=esignet/GetLinkStatus/GetLinkStatusResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Get link status consent UIN for optional claims, uniqueIdentifier=TC_ESignet_GetLinkStatusConsent_06, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_GetLinkStatus_Consent_uin_without_AcceptedClaim_IfOnlyOptionalRequested |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=ESignet_GetLinkStatus_Consent_uin_without_AcceptedClaim_IfOnlyOptionalRequested, endPoint=/v1/esignet/linked-authorization/link-status, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_LinkAuth_Consent_Valid_without_AcceptedClaim_IfOnlyOptionalRequested_sid_transactionId$", "linkCode": "$ID:GenerateLinkCode_Consent_uin_without_AcceptedClaim_IfOnlyOptionalRequested_sid_linkCode$" }, output={ }, inputTemplate=esignet/GetLinkStatus/GetLinkStatus, outputTemplate=esignet/GetLinkStatus/GetLinkStatusResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Get link status consent UIN without_AcceptedClaim_IfOnlyOptionalRequested, uniqueIdentifier=TC_ESignet_GetLinkStatusConsent_10, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_LinkedAuthenticationWla_ConsentVid_SCert_all_Valid_Smoke_sid |
| Testcase Dependency |
| [] |
| Class Name |
| PostWithAutogenIdWithOtpGenerateForWla |
| Testcase Input |
| testCaseName=ESignet_LinkedAuthenticationWla_ConsentVid_SCert_all_Valid_Smoke_sid, endPoint=/v1/esignet/linked-authorization/v2/authenticate, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "linkTransactionId": "$ID:LinkTransaction_Consent_Vid_all_Valid_Smoke_sid_linkTransactionId$", "individualId": "$ID:Generate_Perpetual_VID_Linked_Consent_Valid_Smoke_sid_vid$", "authFactorType": "WLA", "challenge": "$WLATOKENCONSENTVID$", "format": "jwt", "sendOtp":{ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Linked_Consent_Valid_Smoke_sid_vid$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendBindingOtp/SendBindingOtp", "sendOtpEndPoint": "/v1/esignet/binding/binding-otp", }, "validateOtp":{ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Linked_Consent_Valid_Smoke_sid_vid$", "authFactorType1": "WLA", "format1": "jwt", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Linked_Consent_Vid_smoke_Pos_EMAIL$", "format": "alpha-numeric", "publicKey": "$BINDINGCONSENTJWKKEYVID$", "validateOtpReqTemplate": "esignet/WalletBinding/WalletBinding", "validateOtpEndPoint": "/v1/esignet/binding/wallet-binding" } }, output={ "consentAction": "CAPTURE", "sendOtpResp":{ "sendOtpResTemplate":"esignet/SendBindingOtp/SendBindingOtpResult" }, "validateOtpResp":{ "sendOtpResTemplate":"esignet/WalletBinding/WalletBindingResult" } }, inputTemplate=esignet/LinkedAuthenticationWla/LinkedAuthenticationWla, outputTemplate=esignet/LinkedConsent/LinkedAuthenticationConsentWla/LinkedAuthenticationConsentWlaResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=LinkedAuthenticationWla consent VID SCert with all valid details, uniqueIdentifier=null, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.PostWithAutogenIdWithOtpGenerateForWla.test(PostWithAutogenIdWithOtpGenerateForWla.java:92)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_LinkedAuthenticationWla_Consent_EmptyClaim_uin_SCert_all_Valid_Smoke_sid |
| Testcase Dependency |
| [] |
| Class Name |
| PostWithAutogenIdWithOtpGenerateForWla |
| Testcase Input |
| testCaseName=ESignet_LinkedAuthenticationWla_Consent_EmptyClaim_uin_SCert_all_Valid_Smoke_sid, endPoint=/v1/esignet/linked-authorization/v2/authenticate, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "linkTransactionId": "$ID:LinkTransaction_Consent_uin_EmptyClaim_all_Valid_Smoke_sid_linkTransactionId$", "individualId": "$ID:AddIdentity_Linked_Consent_smoke_Pos_UIN$", "authFactorType": "WLA", "challenge": "$WLATOKENCONSENTEMPTYCLAIM$", "format": "jwt", "sendOtp":{ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Linked_Consent_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendBindingOtp/SendBindingOtp", "sendOtpEndPoint": "/v1/esignet/binding/binding-otp", }, "validateOtp":{ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Linked_Consent_smoke_Pos_UIN$", "authFactorType1": "WLA", "format1": "jwt", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Linked_Consent_smoke_Pos_EMAIL$", "format": "alpha-numeric", "publicKey": "$BINDINGCONSENTEMPTYCLAIMJWKKEY$", "validateOtpReqTemplate": "esignet/WalletBinding/WalletBinding", "validateOtpEndPoint": "/v1/esignet/binding/wallet-binding" } }, output={ "consentAction": "CAPTURE", "sendOtpResp":{ "sendOtpResTemplate":"esignet/SendBindingOtp/SendBindingOtpResult" }, "validateOtpResp":{ "sendOtpResTemplate":"esignet/WalletBinding/WalletBindingResult" } }, inputTemplate=esignet/LinkedAuthenticationWla/LinkedAuthenticationWla, outputTemplate=esignet/LinkedConsent/LinkedAuthenticationConsentWla/LinkedAuthenticationConsentWlaResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=LinkedAuthenticationWla consent UIN with empty claim, uniqueIdentifier=null, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_LinkedAuthenticationWla_Consent_forAcceptedClaims_SCert_sid |
| Testcase Dependency |
| [] |
| Class Name |
| PostWithAutogenIdWithOtpGenerateForWla |
| Testcase Input |
| testCaseName=ESignet_LinkedAuthenticationWla_Consent_forAcceptedClaims_SCert_sid, endPoint=/v1/esignet/linked-authorization/v2/authenticate, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "linkTransactionId": "$ID:LinkTransaction_Consent_uin_forAcceptedClaims_sid_linkTransactionId$", "individualId": "$ID:AddIdentity_L2_Valid_Parameters_linkedconsent_forAcceptedClaims_Pos_UIN$", "authFactorType": "WLA", "challenge": "$WLATOKENFORACCEPTEDCLAIM$", "format": "jwt", "sendOtp":{ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_L2_Valid_Parameters_linkedconsent_forAcceptedClaims_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendBindingOtp/SendBindingOtp", "sendOtpEndPoint": "/v1/esignet/binding/binding-otp", }, "validateOtp":{ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_L2_Valid_Parameters_linkedconsent_forAcceptedClaims_Pos_UIN$", "authFactorType1": "WLA", "format1": "jwt", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_L2_Valid_Parameters_linkedconsent_forAcceptedClaims_Pos_EMAIL$", "format": "alpha-numeric", "publicKey": "$BINDINGCONSENTFORACCEPTEDCLAIMJWKKEY$", "validateOtpReqTemplate": "esignet/WalletBinding/WalletBinding", "validateOtpEndPoint": "/v1/esignet/binding/wallet-binding" } }, output={ "consentAction": "CAPTURE", "sendOtpResp":{ "sendOtpResTemplate":"esignet/SendBindingOtp/SendBindingOtpResult" }, "validateOtpResp":{ "sendOtpResTemplate":"esignet/WalletBinding/WalletBindingResult" } }, inputTemplate=esignet/LinkedAuthenticationWla/LinkedAuthenticationWla, outputTemplate=esignet/LinkedConsent/LinkedAuthenticationConsentWla/LinkedAuthenticationConsentWlaResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=LinkedAuthenticationWla consent UIN SCert with all valid details for accepted claims, uniqueIdentifier=null, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_LinkedAuthenticationWla_Consent_forNullAsEssentialClaims_SCert_sid |
| Testcase Dependency |
| [] |
| Class Name |
| PostWithAutogenIdWithOtpGenerateForWla |
| Testcase Input |
| testCaseName=ESignet_LinkedAuthenticationWla_Consent_forNullAsEssentialClaims_SCert_sid, endPoint=/v1/esignet/linked-authorization/v2/authenticate, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "linkTransactionId": "$ID:LinkTransaction_Consent_uin_forNullAsEssentialClaims_sid_linkTransactionId$", "individualId": "$ID:AddIdentity_L2_Valid_Parameters_linkedconsent_for_null_asEssentialClaims_AcceptedClaim_Pos_UIN$", "authFactorType": "WLA", "challenge": "$WLATOKENFORNULLESSENTIALCLAIM$", "format": "jwt", "sendOtp":{ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_L2_Valid_Parameters_linkedconsent_for_null_asEssentialClaims_AcceptedClaim_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendBindingOtp/SendBindingOtp", "sendOtpEndPoint": "/v1/esignet/binding/binding-otp", }, "validateOtp":{ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_L2_Valid_Parameters_linkedconsent_for_null_asEssentialClaims_AcceptedClaim_Pos_UIN$", "authFactorType1": "WLA", "format1": "jwt", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_L2_Valid_Parameters_linkedconsent_for_null_asEssentialClaims_AcceptedClaim_Pos_EMAIL$", "format": "alpha-numeric", "publicKey": "$BINDINGCONSENTFORNULLESSENTIALCLAIMJWKKEY$", "validateOtpReqTemplate": "esignet/WalletBinding/WalletBinding", "validateOtpEndPoint": "/v1/esignet/binding/wallet-binding" } }, output={ "consentAction": "CAPTURE", "sendOtpResp":{ "sendOtpResTemplate":"esignet/SendBindingOtp/SendBindingOtpResult" }, "validateOtpResp":{ "sendOtpResTemplate":"esignet/WalletBinding/WalletBindingResult" } }, inputTemplate=esignet/LinkedAuthenticationWla/LinkedAuthenticationWla, outputTemplate=esignet/LinkedConsent/LinkedAuthenticationConsentWla/LinkedAuthenticationConsentWlaResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=LinkedAuthenticationWla consent UIN SCert with all valid details for NullAsEssentialClaims, uniqueIdentifier=null, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_LinkedAuthenticationWla_Consent_forOnlyEssentialClaims_SCert_sid |
| Testcase Dependency |
| [] |
| Class Name |
| PostWithAutogenIdWithOtpGenerateForWla |
| Testcase Input |
| testCaseName=ESignet_LinkedAuthenticationWla_Consent_forOnlyEssentialClaims_SCert_sid, endPoint=/v1/esignet/linked-authorization/v2/authenticate, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "linkTransactionId": "$ID:LinkTransaction_Consent_uin_forOnlyEssentialClaims_sid_linkTransactionId$", "individualId": "$ID:AddIdentity_L2_Valid_Parameters_linkedconsent_foronlyEssentialClaims_Pos_UIN$", "authFactorType": "WLA", "challenge": "$WLATOKENFORONLYESSENTIALCLAIM$", "format": "jwt", "sendOtp":{ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_L2_Valid_Parameters_linkedconsent_foronlyEssentialClaims_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendBindingOtp/SendBindingOtp", "sendOtpEndPoint": "/v1/esignet/binding/binding-otp", }, "validateOtp":{ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_L2_Valid_Parameters_linkedconsent_foronlyEssentialClaims_Pos_UIN$", "authFactorType1": "WLA", "format1": "jwt", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_L2_Valid_Parameters_linkedconsent_foronlyEssentialClaims_Pos_EMAIL$", "format": "alpha-numeric", "publicKey": "$BINDINGCONSENTFORONLYESSENTIALCLAIMJWKKEY$", "validateOtpReqTemplate": "esignet/WalletBinding/WalletBinding", "validateOtpEndPoint": "/v1/esignet/binding/wallet-binding" } }, output={ "consentAction": "CAPTURE", "sendOtpResp":{ "sendOtpResTemplate":"esignet/SendBindingOtp/SendBindingOtpResult" }, "validateOtpResp":{ "sendOtpResTemplate":"esignet/WalletBinding/WalletBindingResult" } }, inputTemplate=esignet/LinkedAuthenticationWla/LinkedAuthenticationWla, outputTemplate=esignet/LinkedConsent/LinkedAuthenticationConsentWla/LinkedAuthenticationConsentWlaResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=LinkedAuthenticationWla consent UIN SCert with all valid details for only essential Claims, uniqueIdentifier=null, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_LinkedAuthenticationWla_Consent_forOnlyOptionalClaimAsRequested_SCert_sid |
| Testcase Dependency |
| [] |
| Class Name |
| PostWithAutogenIdWithOtpGenerateForWla |
| Testcase Input |
| testCaseName=ESignet_LinkedAuthenticationWla_Consent_forOnlyOptionalClaimAsRequested_SCert_sid, endPoint=/v1/esignet/linked-authorization/v2/authenticate, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "linkTransactionId": "$ID:LinkTransaction_Consent_uin_OnlyOptionalClaimAsRequested_AcceptedClaim_sid_linkTransactionId$", "individualId": "$ID:AddIdentity_L2_Valid_Parameters_linkedconsent_for_OnlyOptionalClaimAsRequested_AcceptedClaim_Pos_UIN$", "authFactorType": "WLA", "challenge": "$WLATOKENFOROPTIONALACCEPTEDCLAIM$", "format": "jwt", "sendOtp":{ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_L2_Valid_Parameters_linkedconsent_for_OnlyOptionalClaimAsRequested_AcceptedClaim_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendBindingOtp/SendBindingOtp", "sendOtpEndPoint": "/v1/esignet/binding/binding-otp", }, "validateOtp":{ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_L2_Valid_Parameters_linkedconsent_for_OnlyOptionalClaimAsRequested_AcceptedClaim_Pos_UIN$", "authFactorType1": "WLA", "format1": "jwt", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_L2_Valid_Parameters_linkedconsent_for_OnlyOptionalClaimAsRequested_AcceptedClaim_Pos_EMAIL$", "format": "alpha-numeric", "publicKey": "$BINDINGCONSENTFOROPTIONALACCEPTEDCLAIMJWKKEY$", "validateOtpReqTemplate": "esignet/WalletBinding/WalletBinding", "validateOtpEndPoint": "/v1/esignet/binding/wallet-binding" } }, output={ "consentAction": "CAPTURE", "sendOtpResp":{ "sendOtpResTemplate":"esignet/SendBindingOtp/SendBindingOtpResult" }, "validateOtpResp":{ "sendOtpResTemplate":"esignet/WalletBinding/WalletBindingResult" } }, inputTemplate=esignet/LinkedAuthenticationWla/LinkedAuthenticationWla, outputTemplate=esignet/LinkedConsent/LinkedAuthenticationConsentWla/LinkedAuthenticationConsentWlaResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=LinkedAuthenticationWla consent UIN SCert with all valid details for forOnlyOptionalClaimAsRequested, uniqueIdentifier=null, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_LinkedAuthenticationWla_Consent_forOptionalClaims_SCert_sid |
| Testcase Dependency |
| [] |
| Class Name |
| PostWithAutogenIdWithOtpGenerateForWla |
| Testcase Input |
| testCaseName=ESignet_LinkedAuthenticationWla_Consent_forOptionalClaims_SCert_sid, endPoint=/v1/esignet/linked-authorization/v2/authenticate, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "linkTransactionId": "$ID:LinkTransaction_Consent_uin_forOptionalClaims_sid_linkTransactionId$", "individualId": "$ID:AddIdentity_L2_Valid_Parameters_linkedconsent_forOptionalClaims_Pos_UIN$", "authFactorType": "WLA", "challenge": "$WLATOKENFOROPTIONALCLAIM$", "format": "jwt", "sendOtp":{ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_L2_Valid_Parameters_linkedconsent_forOptionalClaims_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendBindingOtp/SendBindingOtp", "sendOtpEndPoint": "/v1/esignet/binding/binding-otp", }, "validateOtp":{ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_L2_Valid_Parameters_linkedconsent_forOptionalClaims_Pos_UIN$", "authFactorType1": "WLA", "format1": "jwt", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_L2_Valid_Parameters_linkedconsent_forOptionalClaims_Pos_EMAIL$", "format": "alpha-numeric", "publicKey": "$BINDINGCONSENTFOROPTIONALCLAIMJWKKEY$", "validateOtpReqTemplate": "esignet/WalletBinding/WalletBinding", "validateOtpEndPoint": "/v1/esignet/binding/wallet-binding" } }, output={ "consentAction": "CAPTURE", "sendOtpResp":{ "sendOtpResTemplate":"esignet/SendBindingOtp/SendBindingOtpResult" }, "validateOtpResp":{ "sendOtpResTemplate":"esignet/WalletBinding/WalletBindingResult" } }, inputTemplate=esignet/LinkedAuthenticationWla/LinkedAuthenticationWla, outputTemplate=esignet/LinkedConsent/LinkedAuthenticationConsentWla/LinkedAuthenticationConsentWlaResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=LinkedAuthenticationWla consent UIN SCert with all valid details for optional claims, uniqueIdentifier=null, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_LinkedAuthenticationWla_Consent_forPartialEssentialOptionalClaims_SCert_sid |
| Testcase Dependency |
| [] |
| Class Name |
| PostWithAutogenIdWithOtpGenerateForWla |
| Testcase Input |
| testCaseName=ESignet_LinkedAuthenticationWla_Consent_forPartialEssentialOptionalClaims_SCert_sid, endPoint=/v1/esignet/linked-authorization/v2/authenticate, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "linkTransactionId": "$ID:LinkTransaction_Consent_uin_forPartialEssentialOptionalClaims_sid_linkTransactionId$", "individualId": "$ID:AddIdentity_L2_Valid_Parameters_linkedconsent_forPartialEssentialOptionalClaims_Pos_UIN$", "authFactorType": "WLA", "challenge": "$WLATOKENFORPARTIALESSENTIALOPTIONALCLAIM$", "format": "jwt", "sendOtp":{ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_L2_Valid_Parameters_linkedconsent_forPartialEssentialOptionalClaims_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendBindingOtp/SendBindingOtp", "sendOtpEndPoint": "/v1/esignet/binding/binding-otp", }, "validateOtp":{ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_L2_Valid_Parameters_linkedconsent_forPartialEssentialOptionalClaims_Pos_UIN$", "authFactorType1": "WLA", "format1": "jwt", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_L2_Valid_Parameters_linkedconsent_forPartialEssentialOptionalClaims_Pos_EMAIL$", "format": "alpha-numeric", "publicKey": "$BINDINGCONSENTFORPARTIALESSENTIALOPTIONALCLAIMJWKKEY$", "validateOtpReqTemplate": "esignet/WalletBinding/WalletBinding", "validateOtpEndPoint": "/v1/esignet/binding/wallet-binding" } }, output={ "consentAction": "CAPTURE", "sendOtpResp":{ "sendOtpResTemplate":"esignet/SendBindingOtp/SendBindingOtpResult" }, "validateOtpResp":{ "sendOtpResTemplate":"esignet/WalletBinding/WalletBindingResult" } }, inputTemplate=esignet/LinkedAuthenticationWla/LinkedAuthenticationWla, outputTemplate=esignet/LinkedConsent/LinkedAuthenticationConsentWla/LinkedAuthenticationConsentWlaResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=LinkedAuthenticationWla consent UIN SCert with all valid details for PartialEssential OptionalClaims, uniqueIdentifier=null, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_LinkedAuthenticationWla_Consent_without_AcceptedClaim_IfOnlyOptionalRequested_SCert_sid |
| Testcase Dependency |
| [] |
| Class Name |
| PostWithAutogenIdWithOtpGenerateForWla |
| Testcase Input |
| testCaseName=ESignet_LinkedAuthenticationWla_Consent_without_AcceptedClaim_IfOnlyOptionalRequested_SCert_sid, endPoint=/v1/esignet/linked-authorization/v2/authenticate, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "linkTransactionId": "$ID:LinkTransaction_Consent_uin_without_AcceptedClaim_IfOnlyOptionalRequested_sid_linkTransactionId$", "individualId": "$ID:AddIdentity_L2_Valid_Parameters_linkedconsent_for_without_AcceptedClaim_IfOnlyOptionalRequested_Pos_UIN$", "authFactorType": "WLA", "challenge": "$WLATOKENFORNULLACCEPTEDCLAIM$", "format": "jwt", "sendOtp":{ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_L2_Valid_Parameters_linkedconsent_for_without_AcceptedClaim_IfOnlyOptionalRequested_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendBindingOtp/SendBindingOtp", "sendOtpEndPoint": "/v1/esignet/binding/binding-otp", }, "validateOtp":{ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_L2_Valid_Parameters_linkedconsent_for_without_AcceptedClaim_IfOnlyOptionalRequested_Pos_UIN$", "authFactorType1": "WLA", "format1": "jwt", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_L2_Valid_Parameters_linkedconsent_for_without_AcceptedClaim_IfOnlyOptionalRequested_Pos_EMAIL$", "format": "alpha-numeric", "publicKey": "$BINDINGCONSENTFORNULLACCEPTEDCLAIMJWKKEY$", "validateOtpReqTemplate": "esignet/WalletBinding/WalletBinding", "validateOtpEndPoint": "/v1/esignet/binding/wallet-binding" } }, output={ "consentAction": "CAPTURE", "sendOtpResp":{ "sendOtpResTemplate":"esignet/SendBindingOtp/SendBindingOtpResult" }, "validateOtpResp":{ "sendOtpResTemplate":"esignet/WalletBinding/WalletBindingResult" } }, inputTemplate=esignet/LinkedAuthenticationWla/LinkedAuthenticationWla, outputTemplate=esignet/LinkedConsent/LinkedAuthenticationConsentWla/LinkedAuthenticationConsentWlaResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=LinkedAuthenticationWla consent UIN SCert with all valid details without_AcceptedClaim_IfOnlyOptionalRequested, uniqueIdentifier=null, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_LinkedAuthenticationWla_Consentuin_SCert_all_Valid_Smoke_sid |
| Testcase Dependency |
| [] |
| Class Name |
| PostWithAutogenIdWithOtpGenerateForWla |
| Testcase Input |
| testCaseName=ESignet_LinkedAuthenticationWla_Consentuin_SCert_all_Valid_Smoke_sid, endPoint=/v1/esignet/linked-authorization/v2/authenticate, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "linkTransactionId": "$ID:LinkTransaction_Consent_uin_all_Valid_Smoke_sid_linkTransactionId$", "individualId": "$ID:AddIdentity_Linked_Consent_smoke_Pos_UIN$", "authFactorType": "WLA", "challenge": "$WLATOKENCONSENT$", "format": "jwt", "sendOtp":{ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Linked_Consent_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendBindingOtp/SendBindingOtp", "sendOtpEndPoint": "/v1/esignet/binding/binding-otp", }, "validateOtp":{ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Linked_Consent_smoke_Pos_UIN$", "authFactorType1": "WLA", "format1": "jwt", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Linked_Consent_smoke_Pos_EMAIL$", "format": "alpha-numeric", "publicKey": "$BINDINGCONSENTJWKKEY$", "validateOtpReqTemplate": "esignet/WalletBinding/WalletBinding", "validateOtpEndPoint": "/v1/esignet/binding/wallet-binding" } }, output={ "consentAction": "CAPTURE", "sendOtpResp":{ "sendOtpResTemplate":"esignet/SendBindingOtp/SendBindingOtpResult" }, "validateOtpResp":{ "sendOtpResTemplate":"esignet/WalletBinding/WalletBindingResult" } }, inputTemplate=esignet/LinkedAuthenticationWla/LinkedAuthenticationWla, outputTemplate=esignet/LinkedConsent/LinkedAuthenticationConsentWla/LinkedAuthenticationConsentWlaResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=LinkedAuthenticationWla consent UIN SCert with all valid details, uniqueIdentifier=null, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_LinkedAuthorizationConsent_Consent_Vid_All_Valid_Smoke_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=ESignet_LinkedAuthorizationConsent_Consent_Vid_All_Valid_Smoke_sid, endPoint=/v1/esignet/linked-authorization/v2/consent, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "linkedTransactionId": "$ID:LinkTransaction_Consent_Vid_all_Valid_Smoke_sid_linkTransactionId$", "acceptedClaims": [{claim: "name"},{claim: "gender"},{claim: "email"}], "signature": "$CONSENTDETACHEDSIGNATUREVID$" }, output={ }, inputTemplate=esignet/LinkedConsent/LinkAuthorizationConsent/LinkAuthorizationConsent, outputTemplate=esignet/LinkedAuthorizationConsent/LinkedAuthorizationConsentResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Linked Authorization conset VID with all valid details, uniqueIdentifier=TC_ESignet_LinkedAuthorizationConsent_02, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePost.test(SimplePost.java:98)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_LinkedAuthorizationConsent_Consent_forAcceptedClaim |
| Testcase Dependency |
| [TC_ESignet_LinkTransaction_03, TC_ESignet_GenerateLinkCode_03, TC_ESignet_OAuthDetailsRequestLinked_03, ESignet_CreateOIDCClient_Misp_Valid_Smoke_sid] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=ESignet_LinkedAuthorizationConsent_Consent_forAcceptedClaim, endPoint=/v1/esignet/linked-authorization/v2/consent, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "linkedTransactionId": "$ID:LinkTransaction_Consent_uin_forAcceptedClaims_sid_linkTransactionId$", "acceptedClaims": [{claim: "residenceStatus"}], "signature": "$CONSENTDETACHEDSIGNATUREFORACCEPTEDCLAIM$" }, output={ "errors": [ { "errorCode": "invalid_accepted_claim" } ] }, inputTemplate=esignet/LinkedConsent/LinkAuthorizationConsent/LinkAuthorizationConsent, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Linked Authorization conset UIN with all valid details for accepted claims, uniqueIdentifier=TC_ESignet_LinkedAuthorizationConsent_03, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_LinkedAuthorizationConsent_Consent_forNullAsEssentialClaim |
| Testcase Dependency |
| [TC_ESignet_LinkTransaction_01, TC_ESignet_GenerateLinkCode_01, TC_ESignet_OAuthDetailsRequestLinked_01, TC_ESignet_CreateOIDCClient_01] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=ESignet_LinkedAuthorizationConsent_Consent_forNullAsEssentialClaim, endPoint=/v1/esignet/linked-authorization/v2/consent, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "linkedTransactionId": "$ID:LinkTransaction_Consent_uin_forNullAsEssentialClaims_sid_linkTransactionId$", "acceptedClaims": [], "signature": "$CONSENTDETACHEDSIGNATUREFORNULLESSENTIALCLAIM$" }, output={ "errors": [ { "errorCode": "invalid_accepted_claim" } ] }, inputTemplate=esignet/LinkedConsent/LinkAuthorizationConsent/LinkAuthorizationConsent, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Linked Authorization conset UIN with all valid details for Null As accepted claims, uniqueIdentifier=TC_ESignet_LinkedAuthorizationConsent_07, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_LinkedAuthorizationConsent_Consent_forOnlyEssentialClaim_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=ESignet_LinkedAuthorizationConsent_Consent_forOnlyEssentialClaim_sid, endPoint=/v1/esignet/linked-authorization/v2/consent, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "linkedTransactionId": "$ID:LinkTransaction_Consent_uin_forOnlyEssentialClaims_sid_linkTransactionId$", "acceptedClaims": [{claim: "name"},{claim: "email"}], "signature": "$CONSENTDETACHEDSIGNATUREFORONLYESSENTIALCLAIM$" }, output={ }, inputTemplate=esignet/LinkedConsent/LinkAuthorizationConsent/LinkAuthorizationConsent, outputTemplate=esignet/LinkedAuthorizationConsent/LinkedAuthorizationConsentResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Linked Authorization conset UIN with all valid details for OnlyEssentialClaim, uniqueIdentifier=TC_ESignet_LinkedAuthorizationConsent_06, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_LinkedAuthorizationConsent_Consent_forOnlyOptionalClaimAsRequested_AcceptedClaim_sid |
| Testcase Dependency |
| [TC_ESignet_LinkTransaction_01, TC_ESignet_GenerateLinkCode_01, TC_ESignet_OAuthDetailsRequestLinked_01, TC_ESignet_CreateOIDCClient_01] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=ESignet_LinkedAuthorizationConsent_Consent_forOnlyOptionalClaimAsRequested_AcceptedClaim_sid, endPoint=/v1/esignet/linked-authorization/v2/consent, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "linkedTransactionId": "$ID:LinkTransaction_Consent_uin_OnlyOptionalClaimAsRequested_AcceptedClaim_sid_linkTransactionId$", "acceptedClaims": [{claim: "name"},{claim: "gender"}], "signature": "$CONSENTDETACHEDSIGNATUREFOROPTIONALACCEPTEDCLAIM$" }, output={ }, inputTemplate=esignet/LinkedConsent/LinkAuthorizationConsent/LinkAuthorizationConsent, outputTemplate=esignet/LinkedAuthorizationConsent/LinkedAuthorizationConsentResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Linked Authorization conset UIN with all valid details for OnlyOptionalClaimAsRequested, uniqueIdentifier=TC_ESignet_LinkedAuthorizationConsent_08, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_LinkedAuthorizationConsent_Consent_forOptionalClaim |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=ESignet_LinkedAuthorizationConsent_Consent_forOptionalClaim, endPoint=/v1/esignet/linked-authorization/v2/consent, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "linkedTransactionId": "$ID:LinkTransaction_Consent_uin_forOptionalClaims_sid_linkTransactionId$", "acceptedClaims": [{claim: "picture"},{claim: "gender"}], "signature": "$CONSENTDETACHEDSIGNATUREFOROPTIONALCLAIM$" }, output={ "errors": [ { "errorCode": "invalid_accepted_claim" } ] }, inputTemplate=esignet/LinkedConsent/LinkAuthorizationConsent/LinkAuthorizationConsent, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Linked Authorization conset UIN with all valid details for Optional claims, uniqueIdentifier=TC_ESignet_LinkedAuthorizationConsent_04, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_LinkedAuthorizationConsent_Consent_forPartialEssentialOptionalClaim |
| Testcase Dependency |
| [TC_ESignet_LinkTransaction_01, TC_ESignet_GenerateLinkCode_01, TC_ESignet_OAuthDetailsRequestLinked_01, TC_ESignet_CreateOIDCClient_01] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=ESignet_LinkedAuthorizationConsent_Consent_forPartialEssentialOptionalClaim, endPoint=/v1/esignet/linked-authorization/v2/consent, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "linkedTransactionId": "$ID:LinkTransaction_Consent_uin_forPartialEssentialOptionalClaims_sid_linkTransactionId$", "acceptedClaims": [{claim: "name"},{claim: "gender"},{claim: "picture"}], "signature": "$CONSENTDETACHEDSIGNATUREFORPARTIALESSENTIALOPTIONALCLAIM$" }, output={ "errors": [ { "errorCode": "invalid_accepted_claim" } ] }, inputTemplate=esignet/LinkedConsent/LinkAuthorizationConsent/LinkAuthorizationConsent, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Linked Authorization conset UIN with all valid details for PartialEssential OptionalClaim, uniqueIdentifier=TC_ESignet_LinkedAuthorizationConsent_05, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_LinkedAuthorizationConsent_Consent_uin_All_Valid_Smoke_sid |
| Testcase Dependency |
| [TC_ESignet_LinkTransaction_05, TC_ESignet_GenerateLinkCode_05, TC_ESignet_OAuthDetailsRequestLinked_05, TC_ESignet_CreateOIDCClient_01, TC_ESignet_LinkTransactionConsent_01, TC_ESignet_GenerateLinkCodeConsent_01, ESignet_OAuthDetailsRequest_LinkAuth_Consent_Valid_Smoke_sid] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=ESignet_LinkedAuthorizationConsent_Consent_uin_All_Valid_Smoke_sid, endPoint=/v1/esignet/linked-authorization/v2/consent, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "linkedTransactionId": "$ID:LinkTransaction_Consent_uin_all_Valid_Smoke_sid_linkTransactionId$", "acceptedClaims": [{claim: "name"},{claim: "gender"},{claim: "email"}], "signature": "$CONSENTDETACHEDSIGNATURE$" }, output={ }, inputTemplate=esignet/LinkedConsent/LinkAuthorizationConsent/LinkAuthorizationConsent, outputTemplate=esignet/LinkedAuthorizationConsent/LinkedAuthorizationConsentResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Linked Authorization conset UIN with all valid details, uniqueIdentifier=TC_ESignet_LinkedAuthorizationConsent_01, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_LinkedAuthorizationConsent_Consent_without_AcceptedClaim_IfOnlyOptionalRequested_sid |
| Testcase Dependency |
| [TC_ESignet_LinkTransaction_01, TC_ESignet_GenerateLinkCode_01, TC_ESignet_OAuthDetailsRequestLinked_01, TC_ESignet_CreateOIDCClient_01] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=ESignet_LinkedAuthorizationConsent_Consent_without_AcceptedClaim_IfOnlyOptionalRequested_sid, endPoint=/v1/esignet/linked-authorization/v2/consent, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "linkedTransactionId": "$ID:LinkTransaction_Consent_uin_without_AcceptedClaim_IfOnlyOptionalRequested_sid_linkTransactionId$", "acceptedClaims": [{claim: "name"},{claim: "gender"}], "signature": "$CONSENTDETACHEDSIGNATUREFORNULLACCEPTEDCLAIM$" }, output={ }, inputTemplate=esignet/LinkedConsent/LinkAuthorizationConsent/LinkAuthorizationConsent, outputTemplate=esignet/LinkedAuthorizationConsent/LinkedAuthorizationConsentResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Linked Authorization conset UIN with all valid details without_AcceptedClaim_IfOnlyOptionalRequested, uniqueIdentifier=TC_ESignet_LinkedAuthorizationConsent_09, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_LinkAuthorizationCode_Consent_Vid_all_Valid_Smoke_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_LinkAuthorizationCode_Consent_Vid_all_Valid_Smoke_sid, endPoint=/v1/esignet/linked-authorization/link-auth-code, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_LinkAuth_Consent_vid_Valid_Smoke_sid_transactionId$", "linkedCode": "$ID:GenerateLinkCode_Consent_Vid_all_Valid_Smoke_sid_linkCode$" }, output={ }, inputTemplate=esignet/LinkAuthorizationCode/LinkAuthorizationCode, outputTemplate=esignet/LinkAuthorizationCode/LinkAuthorizationCodeResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Link Authorization code consent VID with all valid details, uniqueIdentifier=TC_ESignet_LinkAuthorizationCodeConsent_02, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:101)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_LinkAuthorizationCode_Consent_uin_all_Valid_Smoke_sid |
| Testcase Dependency |
| [ESignet_OAuthDetailsRequest_LinkAuth_Consent_Valid_Smoke_sid, TC_ESignet_CreateOIDCClient_01, TC_ESignet_GenerateLinkCodeConsent_01] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_LinkAuthorizationCode_Consent_uin_all_Valid_Smoke_sid, endPoint=/v1/esignet/linked-authorization/link-auth-code, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_LinkAuth_Consent_Valid_Smoke_sid_transactionId$", "linkedCode": "$ID:GenerateLinkCode_Consent_uin_all_Valid_Smoke_sid_linkCode$" }, output={ }, inputTemplate=esignet/LinkAuthorizationCode/LinkAuthorizationCode, outputTemplate=esignet/LinkAuthorizationCode/LinkAuthorizationCodeResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Link Authorization code consent UIN with all valid details, uniqueIdentifier=TC_ESignet_LinkAuthorizationCodeConsent_01, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_GenerateToken_LinkedConsent_Vid_Valid_Smoke_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenIdForUrlEncoded |
| Testcase Input |
| testCaseName=ESignet_GenerateToken_LinkedConsent_Vid_Valid_Smoke_sid, endPoint=$GETENDPOINTFROMWELLKNOWN$, role=resident, templateFields=null, input={ "grant_type": "authorization_code", "code": "$ID:LinkAuthorizationCode_Consent_Vid_all_Valid_Smoke_sid_code$", "client_id": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "client_assertion_type": "urn:ietf:params:oauth:client-assertion-type:jwt-bearer", "client_assertion": "$CLIENT_ASSERTION_JWK$", "redirect_uri": "$IDPREDIRECTURI$" }, output={ "token_type": "Bearer" }, inputTemplate=esignet/Consent/GenerateTokenConsent/GenerateTokenConsent, outputTemplate=esignet/Consent/GenerateTokenConsent/GenerateTokenConsentResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generate Token linkedConsent VID with all valid details, uniqueIdentifier=null, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenIdForUrlEncoded.test(SimplePostForAutoGenIdForUrlEncoded.java:102)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_GenerateToken_LinkedConsent_uin_Valid_Smoke_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenIdForUrlEncoded |
| Testcase Input |
| testCaseName=ESignet_GenerateToken_LinkedConsent_uin_Valid_Smoke_sid, endPoint=$GETENDPOINTFROMWELLKNOWN$, role=resident, templateFields=null, input={ "grant_type": "authorization_code", "code": "$ID:LinkAuthorizationCode_Consent_uin_all_Valid_Smoke_sid_code$", "client_id": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "client_assertion_type": "urn:ietf:params:oauth:client-assertion-type:jwt-bearer", "client_assertion": "$CLIENT_ASSERTION_JWK$", "redirect_uri": "$IDPREDIRECTURI$" }, output={ "token_type": "Bearer" }, inputTemplate=esignet/Consent/GenerateTokenConsent/GenerateTokenConsent, outputTemplate=esignet/Consent/GenerateTokenConsent/GenerateTokenConsentResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generate Token linkedConsent UIN with all valid details, uniqueIdentifier=null, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_GetOidcUserInfo_LinkedConsent_Vid_IdpAccessToken_StatusCode_Valid_Smoke_sid |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=ESignet_GetOidcUserInfo_LinkedConsent_Vid_IdpAccessToken_StatusCode_Valid_Smoke_sid, endPoint=/v1/esignet/oidc/userinfo, role=resident, templateFields=null, input={ "idpAccessToken": "$ID:GenerateToken_LinkedConsent_Vid_Valid_Smoke_sid_access_token$" }, output=200, inputTemplate=esignet/Consent/GetOidcUserInfoConsent/GetOidcUserInfoConsent, outputTemplate=esignet/Consent/GetOidcUserInfoConsent/GetOidcUserInfoConsentResult, restMethod=get, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Get OIDC user info for linked consent VID with all valid details, uniqueIdentifier=TC_ESignet_GetOidcUserInfoLinkedConsent_02, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.GetWithParam.test(GetWithParam.java:96)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_GetOidcUserInfo_LinkedConsent_uin_IdpAccessToken_StatusCode_Valid_Smoke_sid |
| Testcase Dependency |
| [ESignet_GenerateToken_LinkedConsent_uin_Valid_Smoke_sid, TC_ESignet_LinkAuthorizationCodeConsent_01, ESignet_OAuthDetailsRequest_LinkAuth_Consent_Valid_Smoke_sid, TC_ESignet_CreateOIDCClient_01, TC_ESignet_GenerateLinkCodeConsent_01] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=ESignet_GetOidcUserInfo_LinkedConsent_uin_IdpAccessToken_StatusCode_Valid_Smoke_sid, endPoint=/v1/esignet/oidc/userinfo, role=resident, templateFields=null, input={ "idpAccessToken": "$ID:GenerateToken_LinkedConsent_uin_Valid_Smoke_sid_access_token$" }, output=200, inputTemplate=esignet/Consent/GetOidcUserInfoConsent/GetOidcUserInfoConsent, outputTemplate=esignet/Consent/GetOidcUserInfoConsent/GetOidcUserInfoConsentResult, restMethod=get, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Get OIDC user info for linked consent UIN with all valid details, uniqueIdentifier=TC_ESignet_GetOidcUserInfoLinkedConsent_01, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_OAuthDetailsRequest_LinkAuth_Consent_SameClaim_Vid_Valid_Smoke_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_OAuthDetailsRequest_LinkAuth_Consent_SameClaim_Vid_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:linked-wallet", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en" }, output={ }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Oauthdetails request linkAuth consent with same claim details VID, uniqueIdentifier=TC_ESignet_OAuthDetailsRequestLinked_06, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:101)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_OAuthDetailsRequest_LinkAuth_Consent_User2_Vid_Valid_Smoke_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_OAuthDetailsRequest_LinkAuth_Consent_User2_Vid_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_Misp_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:linked-wallet", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en" }, output={ }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Oauthdetails request linkAuth consent User2 VID with valid details, uniqueIdentifier=TC_ESignet_OAuthDetailsRequestLinked_04, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:101)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_OAuthDetailsRequest_LinkAuth_Vid_Valid_Smoke_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_OAuthDetailsRequest_LinkAuth_Vid_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:linked-wallet", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en" }, output={ }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Oauthdetails request linkAuth VID with all valid details, uniqueIdentifier=TC_ESignet_OAuthDetailsRequestLinked_02, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:101)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_OAuthDetailsRequest_LinkAuth_Consent_SameClaim_Uin_Valid_Smoke_sid |
| Testcase Dependency |
| [TC_ESignet_CreateOIDCClient_01] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_OAuthDetailsRequest_LinkAuth_Consent_SameClaim_Uin_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:linked-wallet", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en" }, output={ }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Oauthdetails request linkAuth consent with same claim details UIN, uniqueIdentifier=TC_ESignet_OAuthDetailsRequestLinked_05, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_OAuthDetailsRequest_LinkAuth_Consent_User2_Uin_Valid_Smoke_sid |
| Testcase Dependency |
| [ESignet_CreateOIDCClient_Misp_Valid_Smoke_sid] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_OAuthDetailsRequest_LinkAuth_Consent_User2_Uin_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_Misp_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:linked-wallet", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en" }, output={ }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Oauthdetails request linkAuth consent User2 UIN with valid details, uniqueIdentifier=TC_ESignet_OAuthDetailsRequestLinked_03, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_OAuthDetailsRequest_LinkAuth_InvalidAcceptedClaim_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_OAuthDetailsRequest_LinkAuth_InvalidAcceptedClaim_sid, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:linked-wallet", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en" }, output={ }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Oauthdetails request for InvalidAcceptedClaim, uniqueIdentifier=TC_ESignet_OAuthDetailsRequestLinked_08, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_OAuthDetailsRequest_LinkAuth_Other_Valid_Smoke_sid |
| Testcase Dependency |
| [TC_ESignet_CreateOIDCClient_01] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_OAuthDetailsRequest_LinkAuth_Other_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:generated-code", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en" }, output={ }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Oauthdetails request other linkAuth with valid details, uniqueIdentifier=TC_ESignet_OAuthDetailsRequestLinked_07, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_OAuthDetailsRequest_LinkAuth_Valid_Smoke_sid |
| Testcase Dependency |
| [TC_ESignet_CreateOIDCClient_01] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_OAuthDetailsRequest_LinkAuth_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:linked-wallet", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en" }, output={ }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Oauthdetails request linkAuth with all valid details, uniqueIdentifier=TC_ESignet_OAuthDetailsRequestLinked_01, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_OAuthDetailsRequest_LinkAuth_forEmptyAcceptedClaimIfRequestedIsOptional_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_OAuthDetailsRequest_LinkAuth_forEmptyAcceptedClaimIfRequestedIsOptional_sid, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:linked-wallet", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en" }, output={ }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestOptionalClaim, outputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Oauthdetails request for EmptyAcceptedClaimIfRequestedIsOptional, uniqueIdentifier=TC_ESignet_OAuthDetailsRequestLinked_14, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_OAuthDetailsRequest_LinkAuth_forEmptyAsAcceptedClaim_EseentialClaim_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_OAuthDetailsRequest_LinkAuth_forEmptyAsAcceptedClaim_EseentialClaim_sid, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:linked-wallet", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en" }, output={ }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Oauthdetails request for without accepted claim, uniqueIdentifier=TC_ESignet_OAuthDetailsRequestLinked_12, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_OAuthDetailsRequest_LinkAuth_forOnlyEseentialClaim_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_OAuthDetailsRequest_LinkAuth_forOnlyEseentialClaim_sid, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:linked-wallet", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en" }, output={ }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Oauthdetails request for only essential claim if essential and optional are requested claim, uniqueIdentifier=TC_ESignet_OAuthDetailsRequestLinked_11, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_OAuthDetailsRequest_LinkAuth_forOnlyOptionalClaimIfRequestedOptional_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_OAuthDetailsRequest_LinkAuth_forOnlyOptionalClaimIfRequestedOptional_sid, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:linked-wallet", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en" }, output={ }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestOptionalClaim, outputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Oauthdetails request for for Only Optional Claim If Requested Optional, uniqueIdentifier=TC_ESignet_OAuthDetailsRequestLinked_13, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_OAuthDetailsRequest_LinkAuth_forPartialEseentialAndOptionalClaim_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_OAuthDetailsRequest_LinkAuth_forPartialEseentialAndOptionalClaim_sid, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:linked-wallet", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en" }, output={ }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Oauthdetails request for only Partial Eseential And OptionalClaim, uniqueIdentifier=TC_ESignet_OAuthDetailsRequestLinked_10, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_OAuthDetailsRequest_LinkAuth_withOnlyOptionalClaim_IfEssAndOptAsRequestedClaim_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_OAuthDetailsRequest_LinkAuth_withOnlyOptionalClaim_IfEssAndOptAsRequestedClaim_sid, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:linked-wallet", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en" }, output={ }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Oauthdetails request for only optional claim if essential and optional claims are requested claims, uniqueIdentifier=TC_ESignet_OAuthDetailsRequestLinked_09, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_GenerateLinkCode_Consent_Vid_SameClaim_all_Valid_Smoke_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_GenerateLinkCode_Consent_Vid_SameClaim_all_Valid_Smoke_sid, endPoint=/v1/esignet/linked-authorization/link-code, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_LinkAuth_Consent_SameClaim_Vid_Valid_Smoke_sid_transactionId$" }, output={ }, inputTemplate=esignet/GenerateLinkCode/GenerateLinkCode, outputTemplate=esignet/GenerateLinkCode/GenerateLinkCodeResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generate link code consent VID with same claim details, uniqueIdentifier=TC_ESignet_GenerateLinkCode_06, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:101)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_GenerateLinkCode_Consent_Vid_User2_all_Valid_Smoke_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_GenerateLinkCode_Consent_Vid_User2_all_Valid_Smoke_sid, endPoint=/v1/esignet/linked-authorization/link-code, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_LinkAuth_Consent_User2_Vid_Valid_Smoke_sid_transactionId$" }, output={ }, inputTemplate=esignet/GenerateLinkCode/GenerateLinkCode, outputTemplate=esignet/GenerateLinkCode/GenerateLinkCodeResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generate link code consent VID user2 with all valid details, uniqueIdentifier=TC_ESignet_GenerateLinkCode_04, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:101)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_GenerateLinkCode_Vid_all_Valid_Smoke_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_GenerateLinkCode_Vid_all_Valid_Smoke_sid, endPoint=/v1/esignet/linked-authorization/link-code, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_LinkAuth_Vid_Valid_Smoke_sid_transactionId$" }, output={ }, inputTemplate=esignet/GenerateLinkCode/GenerateLinkCode, outputTemplate=esignet/GenerateLinkCode/GenerateLinkCodeResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generate link code with all valid details VID, uniqueIdentifier=TC_ESignet_GenerateLinkCode_02, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:101)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_GenerateLinkCode_Consent_uin_InvalidAcceptedClaim_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_GenerateLinkCode_Consent_uin_InvalidAcceptedClaim_sid, endPoint=/v1/esignet/linked-authorization/link-code, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_LinkAuth_InvalidAcceptedClaim_sid_transactionId$" }, output={ }, inputTemplate=esignet/GenerateLinkCode/GenerateLinkCode, outputTemplate=esignet/GenerateLinkCode/GenerateLinkCodeResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generate link code consent UIN with same claim details for InvalidAcceptedClaim, uniqueIdentifier=TC_ESignet_GenerateLinkCode_17, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_GenerateLinkCode_Consent_uin_SameClaim_all_Valid_Smoke_sid |
| Testcase Dependency |
| [TC_ESignet_OAuthDetailsRequestLinked_05, TC_ESignet_CreateOIDCClient_01] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_GenerateLinkCode_Consent_uin_SameClaim_all_Valid_Smoke_sid, endPoint=/v1/esignet/linked-authorization/link-code, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_LinkAuth_Consent_SameClaim_Uin_Valid_Smoke_sid_transactionId$" }, output={ }, inputTemplate=esignet/GenerateLinkCode/GenerateLinkCode, outputTemplate=esignet/GenerateLinkCode/GenerateLinkCodeResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generate link code consent UIN with same claim details, uniqueIdentifier=TC_ESignet_GenerateLinkCode_05, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_GenerateLinkCode_Consent_uin_User2_all_Valid_Smoke_sid |
| Testcase Dependency |
| [TC_ESignet_OAuthDetailsRequestLinked_03, ESignet_CreateOIDCClient_Misp_Valid_Smoke_sid] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_GenerateLinkCode_Consent_uin_User2_all_Valid_Smoke_sid, endPoint=/v1/esignet/linked-authorization/link-code, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_LinkAuth_Consent_User2_Uin_Valid_Smoke_sid_transactionId$" }, output={ }, inputTemplate=esignet/GenerateLinkCode/GenerateLinkCode, outputTemplate=esignet/GenerateLinkCode/GenerateLinkCodeResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generate link code consent UIN user2 with all valid details, uniqueIdentifier=TC_ESignet_GenerateLinkCode_03, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_GenerateLinkCode_Consent_uin_forEmptyAcceptedClaimIfRequestedIsOptional_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_GenerateLinkCode_Consent_uin_forEmptyAcceptedClaimIfRequestedIsOptional_sid, endPoint=/v1/esignet/linked-authorization/link-code, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_LinkAuth_forEmptyAcceptedClaimIfRequestedIsOptional_sid_transactionId$" }, output={ }, inputTemplate=esignet/GenerateLinkCode/GenerateLinkCode, outputTemplate=esignet/GenerateLinkCode/GenerateLinkCodeResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generate link code consent UIN with claim details forEmptyAcceptedClaimIfRequestedIsOptional, uniqueIdentifier=TC_ESignet_GenerateLinkCode_23, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_GenerateLinkCode_Consent_uin_forEmptyAsAcceptedClaim_EseentialClaim_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_GenerateLinkCode_Consent_uin_forEmptyAsAcceptedClaim_EseentialClaim_sid, endPoint=/v1/esignet/linked-authorization/link-code, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_LinkAuth_forEmptyAsAcceptedClaim_EseentialClaim_sid_transactionId$" }, output={ }, inputTemplate=esignet/GenerateLinkCode/GenerateLinkCode, outputTemplate=esignet/GenerateLinkCode/GenerateLinkCodeResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generate link code consent UIN with claim details forEmptyAsAcceptedClaim_EseentialClaim, uniqueIdentifier=TC_ESignet_GenerateLinkCode_21, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_GenerateLinkCode_Consent_uin_forOnlyEseentialClaim_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_GenerateLinkCode_Consent_uin_forOnlyEseentialClaim_sid, endPoint=/v1/esignet/linked-authorization/link-code, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_LinkAuth_forOnlyEseentialClaim_sid_transactionId$" }, output={ }, inputTemplate=esignet/GenerateLinkCode/GenerateLinkCode, outputTemplate=esignet/GenerateLinkCode/GenerateLinkCodeResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generate link code consent UIN with claim details for only essential claim if essential and optional are requested claim, uniqueIdentifier=TC_ESignet_GenerateLinkCode_20, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_GenerateLinkCode_Consent_uin_forOnlyOptionalClaimIfRequestedOptional_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_GenerateLinkCode_Consent_uin_forOnlyOptionalClaimIfRequestedOptional_sid, endPoint=/v1/esignet/linked-authorization/link-code, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_LinkAuth_forOnlyOptionalClaimIfRequestedOptional_sid_transactionId$" }, output={ }, inputTemplate=esignet/GenerateLinkCode/GenerateLinkCode, outputTemplate=esignet/GenerateLinkCode/GenerateLinkCodeResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generate link code consent UIN with claim details forOnlyOptionalClaimIfRequestedOptional, uniqueIdentifier=TC_ESignet_GenerateLinkCode_22, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_GenerateLinkCode_Consent_uin_forPartialEseentialAndOptionalClaim_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_GenerateLinkCode_Consent_uin_forPartialEseentialAndOptionalClaim_sid, endPoint=/v1/esignet/linked-authorization/link-code, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_LinkAuth_forPartialEseentialAndOptionalClaim_sid_transactionId$" }, output={ }, inputTemplate=esignet/GenerateLinkCode/GenerateLinkCode, outputTemplate=esignet/GenerateLinkCode/GenerateLinkCodeResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generate link code consent UIN with claim details for Partial Eseential And Optional Claim, uniqueIdentifier=TC_ESignet_GenerateLinkCode_19, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_GenerateLinkCode_Consent_uin_withOnlyOptionalClaim_IfEssAndOptAsRequestedClaim_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_GenerateLinkCode_Consent_uin_withOnlyOptionalClaim_IfEssAndOptAsRequestedClaim_sid, endPoint=/v1/esignet/linked-authorization/link-code, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_LinkAuth_withOnlyOptionalClaim_IfEssAndOptAsRequestedClaim_sid_transactionId$" }, output={ }, inputTemplate=esignet/GenerateLinkCode/GenerateLinkCode, outputTemplate=esignet/GenerateLinkCode/GenerateLinkCodeResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generate link code consent UIN with claim details for OnlyOptionalClaim_IfEssAndOptAsRequestedClaim, uniqueIdentifier=TC_ESignet_GenerateLinkCode_18, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_GenerateLinkCode_Empty_transactionId_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_GenerateLinkCode_Empty_transactionId_Neg, endPoint=/v1/esignet/linked-authorization/link-code, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "transactionId": "" }, output={ "errors": [ { "errorCode": "invalid_transaction_id" } ] }, inputTemplate=esignet/GenerateLinkCode/GenerateLinkCode, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generate link code with empty transactionId, uniqueIdentifier=TC_ESignet_GenerateLinkCode_15, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_GenerateLinkCode_Expired_transactionId_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_GenerateLinkCode_Expired_transactionId_Neg, endPoint=/v1/esignet/linked-authorization/link-code, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "transactionId": "4eKDB4GPk6fP8XXEDY7rktwtQF6WiwrOCehT2CwyVT0" }, output={ "errors": [ { "errorCode": "invalid_transaction" } ] }, inputTemplate=esignet/GenerateLinkCode/GenerateLinkCode, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generate link code with expired transactionId, uniqueIdentifier=TC_ESignet_GenerateLinkCode_13, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_GenerateLinkCode_Future_RequestTime_Neg |
| Testcase Dependency |
| [TC_ESignet_OAuthDetailsRequestLinked_07, TC_ESignet_CreateOIDCClient_01] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_GenerateLinkCode_Future_RequestTime_Neg, endPoint=/v1/esignet/linked-authorization/link-code, role=resident, templateFields=null, input={ "requestTime": "2033-11-07T06:51:30.195Z", "transactionId": "$ID:OAuthDetailsRequest_LinkAuth_Other_Valid_Smoke_sid_transactionId$" }, output={ "errors": [ { "errorCode": "invalid_request" } ] }, inputTemplate=esignet/GenerateLinkCode/GenerateLinkCode, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generate link code with future requestTime, uniqueIdentifier=TC_ESignet_GenerateLinkCode_09, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_GenerateLinkCode_Invalid_RequestTime_Neg |
| Testcase Dependency |
| [TC_ESignet_OAuthDetailsRequestLinked_07, TC_ESignet_CreateOIDCClient_01] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_GenerateLinkCode_Invalid_RequestTime_Neg, endPoint=/v1/esignet/linked-authorization/link-code, role=resident, templateFields=null, input={ "requestTime": "2022-11-08T06:35:53", "transactionId": "$ID:OAuthDetailsRequest_LinkAuth_Other_Valid_Smoke_sid_transactionId$" }, output={ "errors": [ { "errorCode": "invalid_request" } ] }, inputTemplate=esignet/GenerateLinkCode/GenerateLinkCode, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generate link code with invalid requestTime, uniqueIdentifier=TC_ESignet_GenerateLinkCode_07, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_GenerateLinkCode_Invalid_transactionId_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_GenerateLinkCode_Invalid_transactionId_Neg, endPoint=/v1/esignet/linked-authorization/link-code, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "transactionId": "transactionId" }, output={ "errors": [ { "errorCode": "invalid_transaction" } ] }, inputTemplate=esignet/GenerateLinkCode/GenerateLinkCode, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generate link code with invalid transactionId, uniqueIdentifier=TC_ESignet_GenerateLinkCode_12, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_GenerateLinkCode_Missing_RequestTime_Neg |
| Testcase Dependency |
| [TC_ESignet_OAuthDetailsRequestLinked_07, TC_ESignet_CreateOIDCClient_01] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_GenerateLinkCode_Missing_RequestTime_Neg, endPoint=/v1/esignet/linked-authorization/link-code, role=resident, templateFields=null, input={ "requestTime": "$REMOVE$", "transactionId": "$ID:OAuthDetailsRequest_LinkAuth_Other_Valid_Smoke_sid_transactionId$" }, output={ "errors": [ { "errorCode": "invalid_request" } ] }, inputTemplate=esignet/GenerateLinkCode/GenerateLinkCode, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generate link code without requestTime, uniqueIdentifier=TC_ESignet_GenerateLinkCode_10, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_GenerateLinkCode_Missing_transactionId_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_GenerateLinkCode_Missing_transactionId_Neg, endPoint=/v1/esignet/linked-authorization/link-code, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "transactionId": "$REMOVE$" }, output={ "errors": [ { "errorCode": "invalid_transaction_id" } ] }, inputTemplate=esignet/GenerateLinkCode/GenerateLinkCode, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generate link code without transactionId, uniqueIdentifier=TC_ESignet_GenerateLinkCode_14, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_GenerateLinkCode_Null_transactionId_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_GenerateLinkCode_Null_transactionId_Neg, endPoint=/v1/esignet/linked-authorization/link-code, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "transactionId": "null" }, output={ "errors": [ { "errorCode": "invalid_transaction" } ] }, inputTemplate=esignet/GenerateLinkCode/GenerateLinkCode, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generate link code with Null in transactionId, uniqueIdentifier=TC_ESignet_GenerateLinkCode_16, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_GenerateLinkCode_Past_RequestTime_Neg |
| Testcase Dependency |
| [TC_ESignet_OAuthDetailsRequestLinked_07, TC_ESignet_CreateOIDCClient_01] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_GenerateLinkCode_Past_RequestTime_Neg, endPoint=/v1/esignet/linked-authorization/link-code, role=resident, templateFields=null, input={ "requestTime": "2022-11-07T06:51:30.195Z", "transactionId": "$ID:OAuthDetailsRequest_LinkAuth_Other_Valid_Smoke_sid_transactionId$" }, output={ "errors": [ { "errorCode": "invalid_request" } ] }, inputTemplate=esignet/GenerateLinkCode/GenerateLinkCode, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generate link code with past requestTime, uniqueIdentifier=TC_ESignet_GenerateLinkCode_08, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_GenerateLinkCode_Space_As_RequestTime_Neg |
| Testcase Dependency |
| [TC_ESignet_OAuthDetailsRequestLinked_07, TC_ESignet_CreateOIDCClient_01] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_GenerateLinkCode_Space_As_RequestTime_Neg, endPoint=/v1/esignet/linked-authorization/link-code, role=resident, templateFields=null, input={ "requestTime": " ", "transactionId": "$ID:OAuthDetailsRequest_LinkAuth_Other_Valid_Smoke_sid_transactionId$" }, output={ "errors": [ { "errorCode": "invalid_request" } ] }, inputTemplate=esignet/GenerateLinkCode/GenerateLinkCode, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generate link code with only space in requestTime, uniqueIdentifier=TC_ESignet_GenerateLinkCode_11, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_GenerateLinkCode_all_Valid_Smoke_sid |
| Testcase Dependency |
| [TC_ESignet_OAuthDetailsRequestLinked_01, TC_ESignet_CreateOIDCClient_01] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_GenerateLinkCode_all_Valid_Smoke_sid, endPoint=/v1/esignet/linked-authorization/link-code, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_LinkAuth_Valid_Smoke_sid_transactionId$" }, output={ }, inputTemplate=esignet/GenerateLinkCode/GenerateLinkCode, outputTemplate=esignet/GenerateLinkCode/GenerateLinkCodeResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generate link code with all valid details, uniqueIdentifier=TC_ESignet_GenerateLinkCode_01, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_LinkTransaction_Consent_Vid_SameClaim_all_Valid_Smoke_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_LinkTransaction_Consent_Vid_SameClaim_all_Valid_Smoke_sid, endPoint=/v1/esignet/linked-authorization/link-transaction, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "linkCode": "$ID:GenerateLinkCode_Consent_Vid_SameClaim_all_Valid_Smoke_sid_linkCode$" }, output={ }, inputTemplate=esignet/LinkTransaction/LinkTransaction, outputTemplate=esignet/LinkTransaction/LinkTransactionResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=link transaction consent VID with same claim and all valid details, uniqueIdentifier=TC_ESignet_LinkTransaction_06, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:101)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_LinkTransaction_Consent_Vid_User2_all_Valid_Smoke_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_LinkTransaction_Consent_Vid_User2_all_Valid_Smoke_sid, endPoint=/v1/esignet/linked-authorization/link-transaction, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "linkCode": "$ID:GenerateLinkCode_Consent_Vid_User2_all_Valid_Smoke_sid_linkCode$" }, output={ }, inputTemplate=esignet/LinkTransaction/LinkTransaction, outputTemplate=esignet/LinkTransaction/LinkTransactionResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=link transaction consent VID User2 with all valid details, uniqueIdentifier=TC_ESignet_LinkTransaction_04, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:101)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_LinkTransaction_Vid_all_Valid_Smoke_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_LinkTransaction_Vid_all_Valid_Smoke_sid, endPoint=/v1/esignet/linked-authorization/link-transaction, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "linkCode": "$ID:GenerateLinkCode_Vid_all_Valid_Smoke_sid_linkCode$" }, output={ }, inputTemplate=esignet/LinkTransaction/LinkTransaction, outputTemplate=esignet/LinkTransaction/LinkTransactionResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=link transaction VID with all valid details, uniqueIdentifier=TC_ESignet_LinkTransaction_02, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:101)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_LinkTransaction_Absent_RequestTime_Neg |
| Testcase Dependency |
| [TC_ESignet_GenerateLinkCode_01, TC_ESignet_OAuthDetailsRequestLinked_01, TC_ESignet_CreateOIDCClient_01] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_LinkTransaction_Absent_RequestTime_Neg, endPoint=/v1/esignet/linked-authorization/link-transaction, role=resident, templateFields=null, input={ "linkCode": "$ID:GenerateLinkCode_all_Valid_Smoke_sid_linkCode$" }, output={ "errors": [ { "errorCode": "invalid_request" } ] }, inputTemplate=esignet/LinkTransaction/LinkTransaction, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=link transaction without requestTime, uniqueIdentifier=TC_ESignet_LinkTransaction_10, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_LinkTransaction_Consent_uin_SameClaim_all_Valid_Smoke_sid |
| Testcase Dependency |
| [TC_ESignet_GenerateLinkCode_05, TC_ESignet_OAuthDetailsRequestLinked_05, TC_ESignet_CreateOIDCClient_01] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_LinkTransaction_Consent_uin_SameClaim_all_Valid_Smoke_sid, endPoint=/v1/esignet/linked-authorization/link-transaction, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "linkCode": "$ID:GenerateLinkCode_Consent_uin_SameClaim_all_Valid_Smoke_sid_linkCode$" }, output={ }, inputTemplate=esignet/LinkTransaction/LinkTransaction, outputTemplate=esignet/LinkTransaction/LinkTransactionResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=link transaction consent UIN with same claim and all valid details, uniqueIdentifier=TC_ESignet_LinkTransaction_05, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_LinkTransaction_Consent_uin_User2_all_Valid_Smoke_sid |
| Testcase Dependency |
| [TC_ESignet_GenerateLinkCode_03, TC_ESignet_OAuthDetailsRequestLinked_03, ESignet_CreateOIDCClient_Misp_Valid_Smoke_sid] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_LinkTransaction_Consent_uin_User2_all_Valid_Smoke_sid, endPoint=/v1/esignet/linked-authorization/link-transaction, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "linkCode": "$ID:GenerateLinkCode_Consent_uin_User2_all_Valid_Smoke_sid_linkCode$" }, output={ }, inputTemplate=esignet/LinkTransaction/LinkTransaction, outputTemplate=esignet/LinkTransaction/LinkTransactionResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=link transaction consent UIN User2 with all valid details, uniqueIdentifier=TC_ESignet_LinkTransaction_03, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_LinkTransaction_Empty_LinkCode_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_LinkTransaction_Empty_LinkCode_Neg, endPoint=/v1/esignet/linked-authorization/link-transaction, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "linkCode": "" }, output={ "errors": [ { "errorCode": "invalid_link_code" } ] }, inputTemplate=esignet/LinkTransaction/LinkTransaction, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=link transaction with empty value in linkCode, uniqueIdentifier=TC_ESignet_LinkTransaction_16, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_LinkTransaction_Empty_RequestTime_Neg |
| Testcase Dependency |
| [TC_ESignet_GenerateLinkCode_01, TC_ESignet_OAuthDetailsRequestLinked_01, TC_ESignet_CreateOIDCClient_01] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_LinkTransaction_Empty_RequestTime_Neg, endPoint=/v1/esignet/linked-authorization/link-transaction, role=resident, templateFields=null, input={ "requestTime": "", "linkCode": "$ID:GenerateLinkCode_all_Valid_Smoke_sid_linkCode$" }, output={ "errors": [ { "errorCode": "invalid_request" } ] }, inputTemplate=esignet/LinkTransaction/LinkTransaction, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=link transaction with empty value in requestTime, uniqueIdentifier=TC_ESignet_LinkTransaction_12, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_LinkTransaction_Expired_LinkCode_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_LinkTransaction_Expired_LinkCode_Neg, endPoint=/v1/esignet/linked-authorization/link-transaction, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "linkCode": "8VaJtjUopVpq8Hd" }, output={ "errors": [ { "errorCode": "invalid_link_code" } ] }, inputTemplate=esignet/LinkTransaction/LinkTransaction, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=link transaction with expired linkCode, uniqueIdentifier=TC_ESignet_LinkTransaction_15, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_LinkTransaction_Invalid_LinkCode_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_LinkTransaction_Invalid_LinkCode_Neg, endPoint=/v1/esignet/linked-authorization/link-transaction, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "linkCode": "$5Ng" }, output={ "errors": [ { "errorCode": "invalid_link_code" } ] }, inputTemplate=esignet/LinkTransaction/LinkTransaction, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=link transaction with invalid linkCode, uniqueIdentifier=TC_ESignet_LinkTransaction_13, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_LinkTransaction_Invalid_RequestTime_Neg |
| Testcase Dependency |
| [TC_ESignet_GenerateLinkCode_01, TC_ESignet_OAuthDetailsRequestLinked_01, TC_ESignet_CreateOIDCClient_01] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_LinkTransaction_Invalid_RequestTime_Neg, endPoint=/v1/esignet/linked-authorization/link-transaction, role=resident, templateFields=null, input={ "requestTime": "2022-11-08T06:35:53", "linkCode": "$ID:GenerateLinkCode_all_Valid_Smoke_sid_linkCode$" }, output={ "errors": [ { "errorCode": "invalid_request" } ] }, inputTemplate=esignet/LinkTransaction/LinkTransaction, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=link transaction with invalid requestTime, uniqueIdentifier=TC_ESignet_LinkTransaction_07, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_LinkTransaction_Missing_val_LinkCode_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_LinkTransaction_Missing_val_LinkCode_Neg, endPoint=/v1/esignet/linked-authorization/link-transaction, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "linkCode": "$REMOVE$" }, output={ "errors": [ { "errorCode": "invalid_link_code" } ] }, inputTemplate=esignet/LinkTransaction/LinkTransaction, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=link transaction without linkCode, uniqueIdentifier=TC_ESignet_LinkTransaction_14, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_LinkTransaction_Null_LinkCode_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_LinkTransaction_Null_LinkCode_Neg, endPoint=/v1/esignet/linked-authorization/link-transaction, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "linkCode": "null" }, output={ "errors": [ { "errorCode": "invalid_link_code" } ] }, inputTemplate=esignet/LinkTransaction/LinkTransaction, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=link transaction with Null in linkCode, uniqueIdentifier=TC_ESignet_LinkTransaction_17, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_LinkTransaction_RequestTime_FutureValue_Neg |
| Testcase Dependency |
| [TC_ESignet_GenerateLinkCode_01, TC_ESignet_OAuthDetailsRequestLinked_01, TC_ESignet_CreateOIDCClient_01] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_LinkTransaction_RequestTime_FutureValue_Neg, endPoint=/v1/esignet/linked-authorization/link-transaction, role=resident, templateFields=null, input={ "requestTime": "2024-01-16T00:17:54.649Z", "linkCode": "$ID:GenerateLinkCode_all_Valid_Smoke_sid_linkCode$" }, output={ "errors": [ { "errorCode": "invalid_request" } ] }, inputTemplate=esignet/LinkTransaction/LinkTransaction, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=link transaction with future value in requestTime, uniqueIdentifier=TC_ESignet_LinkTransaction_09, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_LinkTransaction_RequestTime_PastValue_Neg |
| Testcase Dependency |
| [TC_ESignet_GenerateLinkCode_01, TC_ESignet_OAuthDetailsRequestLinked_01, TC_ESignet_CreateOIDCClient_01] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_LinkTransaction_RequestTime_PastValue_Neg, endPoint=/v1/esignet/linked-authorization/link-transaction, role=resident, templateFields=null, input={ "requestTime": "2023-01-16T00:17:54.649Z", "linkCode": "$ID:GenerateLinkCode_all_Valid_Smoke_sid_linkCode$" }, output={ "errors": [ { "errorCode": "invalid_request" } ] }, inputTemplate=esignet/LinkTransaction/LinkTransaction, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=link transaction with past value in requestTime, uniqueIdentifier=TC_ESignet_LinkTransaction_08, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_LinkTransaction_Space_Val_RequestTime_Neg |
| Testcase Dependency |
| [TC_ESignet_GenerateLinkCode_01, TC_ESignet_OAuthDetailsRequestLinked_01, TC_ESignet_CreateOIDCClient_01] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_LinkTransaction_Space_Val_RequestTime_Neg, endPoint=/v1/esignet/linked-authorization/link-transaction, role=resident, templateFields=null, input={ "requestTime": " ", "linkCode": "$ID:GenerateLinkCode_all_Valid_Smoke_sid_linkCode$" }, output={ "errors": [ { "errorCode": "invalid_request" } ] }, inputTemplate=esignet/LinkTransaction/LinkTransaction, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=link transaction with only space in requestTime, uniqueIdentifier=TC_ESignet_LinkTransaction_11, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_LinkTransaction_all_Valid_Smoke_sid |
| Testcase Dependency |
| [TC_ESignet_GenerateLinkCode_01, TC_ESignet_OAuthDetailsRequestLinked_01, TC_ESignet_CreateOIDCClient_01] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_LinkTransaction_all_Valid_Smoke_sid, endPoint=/v1/esignet/linked-authorization/link-transaction, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "linkCode": "$ID:GenerateLinkCode_all_Valid_Smoke_sid_linkCode$" }, output={ }, inputTemplate=esignet/LinkTransaction/LinkTransaction, outputTemplate=esignet/LinkTransaction/LinkTransactionResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=link transaction with all valid details, uniqueIdentifier=TC_ESignet_LinkTransaction_01, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_LinkTransaction_forEmptyAcceptedClaimIfRequestedIsOptional_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_LinkTransaction_forEmptyAcceptedClaimIfRequestedIsOptional_sid, endPoint=/v1/esignet/linked-authorization/link-transaction, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "linkCode": "$ID:GenerateLinkCode_Consent_uin_forEmptyAcceptedClaimIfRequestedIsOptional_sid_linkCode$" }, output={ }, inputTemplate=esignet/LinkTransaction/LinkTransaction, outputTemplate=esignet/LinkTransaction/LinkTransactionResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=link transaction with valid details forEmptyAcceptedClaimIfRequestedIsOptional, uniqueIdentifier=TC_ESignet_LinkTransaction_24, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_LinkTransaction_forEmptyAsAcceptedClaim_EseentialClaim_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_LinkTransaction_forEmptyAsAcceptedClaim_EseentialClaim_sid, endPoint=/v1/esignet/linked-authorization/link-transaction, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "linkCode": "$ID:GenerateLinkCode_Consent_uin_forEmptyAsAcceptedClaim_EseentialClaim_sid_linkCode$" }, output={ }, inputTemplate=esignet/LinkTransaction/LinkTransaction, outputTemplate=esignet/LinkTransaction/LinkTransactionResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=link transaction with valid details forEmptyAsAcceptedClaim_EseentialClaim, uniqueIdentifier=TC_ESignet_LinkTransaction_22, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_LinkTransaction_forInvalidAcceptedClaim_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_LinkTransaction_forInvalidAcceptedClaim_sid, endPoint=/v1/esignet/linked-authorization/link-transaction, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "linkCode": "$ID:GenerateLinkCode_Consent_uin_InvalidAcceptedClaim_sid_linkCode$" }, output={ }, inputTemplate=esignet/LinkTransaction/LinkTransaction, outputTemplate=esignet/LinkTransaction/LinkTransactionResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=link transaction with valid details for InvalidAcceptedClaim, uniqueIdentifier=TC_ESignet_LinkTransaction_18, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_LinkTransaction_forOnlyEseentialClaim_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_LinkTransaction_forOnlyEseentialClaim_sid, endPoint=/v1/esignet/linked-authorization/link-transaction, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "linkCode": "$ID:GenerateLinkCode_Consent_uin_forOnlyEseentialClaim_sid_linkCode$" }, output={ }, inputTemplate=esignet/LinkTransaction/LinkTransaction, outputTemplate=esignet/LinkTransaction/LinkTransactionResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=link transaction with valid details for forOnlyEseentialClaim, uniqueIdentifier=TC_ESignet_LinkTransaction_21, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_LinkTransaction_forOnlyOptionalClaimIfRequestedOptional_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_LinkTransaction_forOnlyOptionalClaimIfRequestedOptional_sid, endPoint=/v1/esignet/linked-authorization/link-transaction, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "linkCode": "$ID:GenerateLinkCode_Consent_uin_forOnlyOptionalClaimIfRequestedOptional_sid_linkCode$" }, output={ }, inputTemplate=esignet/LinkTransaction/LinkTransaction, outputTemplate=esignet/LinkTransaction/LinkTransactionResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=link transaction with valid details forOnlyOptionalClaimIfRequestedOptional, uniqueIdentifier=TC_ESignet_LinkTransaction_23, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_LinkTransaction_forPartialEseentialAndOptionalClaim_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_LinkTransaction_forPartialEseentialAndOptionalClaim_sid, endPoint=/v1/esignet/linked-authorization/link-transaction, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "linkCode": "$ID:GenerateLinkCode_Consent_uin_forPartialEseentialAndOptionalClaim_sid_linkCode$" }, output={ }, inputTemplate=esignet/LinkTransaction/LinkTransaction, outputTemplate=esignet/LinkTransaction/LinkTransactionResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=link transaction with valid details for PartialEseentialAndOptionalClaim, uniqueIdentifier=TC_ESignet_LinkTransaction_20, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_LinkTransaction_withOnlyOptionalClaim_IfEssAndOptAsRequestedClaim_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_LinkTransaction_withOnlyOptionalClaim_IfEssAndOptAsRequestedClaim_sid, endPoint=/v1/esignet/linked-authorization/link-transaction, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "linkCode": "$ID:GenerateLinkCode_Consent_uin_withOnlyOptionalClaim_IfEssAndOptAsRequestedClaim_sid_linkCode$" }, output={ }, inputTemplate=esignet/LinkTransaction/LinkTransaction, outputTemplate=esignet/LinkTransaction/LinkTransactionResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=link transaction with valid details for withOnlyOptionalClaim_IfEssAndOptAsRequestedClaim, uniqueIdentifier=TC_ESignet_LinkTransaction_19, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_GetLinkStatus_Consent_Vid_SameClaim_all_Valid_Smoke |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=ESignet_GetLinkStatus_Consent_Vid_SameClaim_all_Valid_Smoke, endPoint=/v1/esignet/linked-authorization/link-status, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_LinkAuth_Consent_SameClaim_Vid_Valid_Smoke_sid_transactionId$", "linkCode": "$ID:GenerateLinkCode_Consent_Vid_SameClaim_all_Valid_Smoke_sid_linkCode$" }, output={ }, inputTemplate=esignet/GetLinkStatus/GetLinkStatus, outputTemplate=esignet/GetLinkStatus/GetLinkStatusResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Get link status consent UIN with same claim and all valid details, uniqueIdentifier=TC_ESignet_GetLinkStatus_06, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePost.test(SimplePost.java:98)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_GetLinkStatus_Consent_Vid_User2_all_Valid_Smoke |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=ESignet_GetLinkStatus_Consent_Vid_User2_all_Valid_Smoke, endPoint=/v1/esignet/linked-authorization/link-status, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_LinkAuth_Consent_User2_Vid_Valid_Smoke_sid_transactionId$", "linkCode": "$ID:GenerateLinkCode_Consent_Vid_User2_all_Valid_Smoke_sid_linkCode$" }, output={ }, inputTemplate=esignet/GetLinkStatus/GetLinkStatus, outputTemplate=esignet/GetLinkStatus/GetLinkStatusResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Get link status consent VID User2 with all valid details, uniqueIdentifier=TC_ESignet_GetLinkStatus_04, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePost.test(SimplePost.java:98)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_GetLinkStatus_Vid_all_Valid_Smoke |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=ESignet_GetLinkStatus_Vid_all_Valid_Smoke, endPoint=/v1/esignet/linked-authorization/link-status, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_LinkAuth_Vid_Valid_Smoke_sid_transactionId$", "linkCode": "$ID:GenerateLinkCode_Vid_all_Valid_Smoke_sid_linkCode$" }, output={ }, inputTemplate=esignet/GetLinkStatus/GetLinkStatus, outputTemplate=esignet/GetLinkStatus/GetLinkStatusResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Get link status with all valid details VID, uniqueIdentifier=TC_ESignet_GetLinkStatus_02, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePost.test(SimplePost.java:98)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_GetLinkStatus_Consent_uin_SameClaim_all_Valid_Smoke |
| Testcase Dependency |
| [TC_ESignet_OAuthDetailsRequestLinked_05, TC_ESignet_CreateOIDCClient_01, TC_ESignet_GenerateLinkCode_05] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=ESignet_GetLinkStatus_Consent_uin_SameClaim_all_Valid_Smoke, endPoint=/v1/esignet/linked-authorization/link-status, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_LinkAuth_Consent_SameClaim_Uin_Valid_Smoke_sid_transactionId$", "linkCode": "$ID:GenerateLinkCode_Consent_uin_SameClaim_all_Valid_Smoke_sid_linkCode$" }, output={ }, inputTemplate=esignet/GetLinkStatus/GetLinkStatus, outputTemplate=esignet/GetLinkStatus/GetLinkStatusResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Get link status consent UIN with same claim and all valid details, uniqueIdentifier=TC_ESignet_GetLinkStatus_05, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_GetLinkStatus_Consent_uin_User2_all_Valid_Smoke |
| Testcase Dependency |
| [TC_ESignet_OAuthDetailsRequestLinked_03, ESignet_CreateOIDCClient_Misp_Valid_Smoke_sid, TC_ESignet_GenerateLinkCode_03] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=ESignet_GetLinkStatus_Consent_uin_User2_all_Valid_Smoke, endPoint=/v1/esignet/linked-authorization/link-status, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_LinkAuth_Consent_User2_Uin_Valid_Smoke_sid_transactionId$", "linkCode": "$ID:GenerateLinkCode_Consent_uin_User2_all_Valid_Smoke_sid_linkCode$" }, output={ }, inputTemplate=esignet/GetLinkStatus/GetLinkStatus, outputTemplate=esignet/GetLinkStatus/GetLinkStatusResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Get link status consent UIN User2 with all valid details, uniqueIdentifier=TC_ESignet_GetLinkStatus_03, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_GetLinkStatus_Empty_LinkCode_Neg |
| Testcase Dependency |
| [TC_ESignet_OAuthDetailsRequestLinked_07, TC_ESignet_CreateOIDCClient_01] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=ESignet_GetLinkStatus_Empty_LinkCode_Neg, endPoint=/v1/esignet/linked-authorization/link-status, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_LinkAuth_Other_Valid_Smoke_sid_transactionId$", "linkCode": "" }, output={ "errors": [ { "errorCode": "invalid_link_code" } ] }, inputTemplate=esignet/GetLinkStatus/GetLinkStatus, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Get link status with empty linkCode, uniqueIdentifier=TC_ESignet_GetLinkStatus_21, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_GetLinkStatus_Empty_TransactionId_Neg |
| Testcase Dependency |
| [TC_ESignet_GenerateLinkCode_01, TC_ESignet_OAuthDetailsRequestLinked_01, TC_ESignet_CreateOIDCClient_01] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=ESignet_GetLinkStatus_Empty_TransactionId_Neg, endPoint=/v1/esignet/linked-authorization/link-status, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "transactionId": "", "linkCode": "$ID:GenerateLinkCode_all_Valid_Smoke_sid_linkCode$" }, output={ "errors": [ { "errorCode": "invalid_transaction_id" } ] }, inputTemplate=esignet/GetLinkStatus/GetLinkStatus, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Get link status with empty transactionId, uniqueIdentifier=TC_ESignet_GetLinkStatus_14, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_GetLinkStatus_Expired_LinkCode_Neg |
| Testcase Dependency |
| [TC_ESignet_OAuthDetailsRequestLinked_07, TC_ESignet_CreateOIDCClient_01] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=ESignet_GetLinkStatus_Expired_LinkCode_Neg, endPoint=/v1/esignet/linked-authorization/link-status, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_LinkAuth_Other_Valid_Smoke_sid_transactionId$", "linkCode": "y7djExbsje5uzKi" }, output={ "errors": [ { "errorCode": "invalid_link_code" } ] }, inputTemplate=esignet/GetLinkStatus/GetLinkStatus, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Get link status with expired linkCode, uniqueIdentifier=TC_ESignet_GetLinkStatus_19, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_GetLinkStatus_Expired_TransactionId_Neg |
| Testcase Dependency |
| [TC_ESignet_GenerateLinkCode_01, TC_ESignet_OAuthDetailsRequestLinked_01, TC_ESignet_CreateOIDCClient_01] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=ESignet_GetLinkStatus_Expired_TransactionId_Neg, endPoint=/v1/esignet/linked-authorization/link-status, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "transactionId": "4eKDB4GPk6fP8XXEDY7rktwtQF6WiwrOCehT2CwyVT0", "linkCode": "$ID:GenerateLinkCode_all_Valid_Smoke_sid_linkCode$" }, output={ "errors": [ { "errorCode": "invalid_link_code" } ] }, inputTemplate=esignet/GetLinkStatus/GetLinkStatus, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Get link status with expired transactionId, uniqueIdentifier=TC_ESignet_GetLinkStatus_13, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_GetLinkStatus_Future_RequestTime_Neg |
| Testcase Dependency |
| [TC_ESignet_OAuthDetailsRequestLinked_07, TC_ESignet_CreateOIDCClient_01, TC_ESignet_GenerateLinkCode_01, TC_ESignet_OAuthDetailsRequestLinked_01] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=ESignet_GetLinkStatus_Future_RequestTime_Neg, endPoint=/v1/esignet/linked-authorization/link-status, role=resident, templateFields=null, input={ "requestTime": "2033-11-07T06:51:30.195Z", "transactionId": "$ID:OAuthDetailsRequest_LinkAuth_Other_Valid_Smoke_sid_transactionId$", "linkCode": "$ID:GenerateLinkCode_all_Valid_Smoke_sid_linkCode$" }, output={ "errors": [ { "errorCode": "invalid_request" } ] }, inputTemplate=esignet/GetLinkStatus/GetLinkStatus, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Get link status with future value in requestTime, uniqueIdentifier=TC_ESignet_GetLinkStatus_09, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_GetLinkStatus_Invalid_LinkCode_Neg |
| Testcase Dependency |
| [TC_ESignet_OAuthDetailsRequestLinked_07, TC_ESignet_CreateOIDCClient_01] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=ESignet_GetLinkStatus_Invalid_LinkCode_Neg, endPoint=/v1/esignet/linked-authorization/link-status, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_LinkAuth_Other_Valid_Smoke_sid_transactionId$", "linkCode": "linkCode" }, output={ "errors": [ { "errorCode": "invalid_link_code" } ] }, inputTemplate=esignet/GetLinkStatus/GetLinkStatus, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Get link status with invalid linkCode, uniqueIdentifier=TC_ESignet_GetLinkStatus_18, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_GetLinkStatus_Invalid_RequestTime_Neg |
| Testcase Dependency |
| [TC_ESignet_OAuthDetailsRequestLinked_07, TC_ESignet_CreateOIDCClient_01, TC_ESignet_GenerateLinkCode_01, TC_ESignet_OAuthDetailsRequestLinked_01] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=ESignet_GetLinkStatus_Invalid_RequestTime_Neg, endPoint=/v1/esignet/linked-authorization/link-status, role=resident, templateFields=null, input={ "requestTime": "2022-11-08T06:35:53", "transactionId": "$ID:OAuthDetailsRequest_LinkAuth_Other_Valid_Smoke_sid_transactionId$", "linkCode": "$ID:GenerateLinkCode_all_Valid_Smoke_sid_linkCode$" }, output={ "errors": [ { "errorCode": "invalid_request" } ] }, inputTemplate=esignet/GetLinkStatus/GetLinkStatus, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Get link status with invalid requestTime, uniqueIdentifier=TC_ESignet_GetLinkStatus_07, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_GetLinkStatus_Invalid_TransactionId_Neg |
| Testcase Dependency |
| [TC_ESignet_GenerateLinkCode_01, TC_ESignet_OAuthDetailsRequestLinked_01, TC_ESignet_CreateOIDCClient_01] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=ESignet_GetLinkStatus_Invalid_TransactionId_Neg, endPoint=/v1/esignet/linked-authorization/link-status, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "transactionId": "transactionId", "linkCode": "$ID:GenerateLinkCode_all_Valid_Smoke_sid_linkCode$" }, output={ "errors": [ { "errorCode": "invalid_link_code" } ] }, inputTemplate=esignet/GetLinkStatus/GetLinkStatus, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Get link status with invalid transactionId, uniqueIdentifier=TC_ESignet_GetLinkStatus_12, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_GetLinkStatus_Missing_LinkCode_Neg |
| Testcase Dependency |
| [TC_ESignet_OAuthDetailsRequestLinked_07, TC_ESignet_CreateOIDCClient_01] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=ESignet_GetLinkStatus_Missing_LinkCode_Neg, endPoint=/v1/esignet/linked-authorization/link-status, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_LinkAuth_Other_Valid_Smoke_sid_transactionId$", "linkCode": "$REMOVE$" }, output={ "errors": [ { "errorCode": "invalid_link_code" } ] }, inputTemplate=esignet/GetLinkStatus/GetLinkStatus, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Get link status without linkCode, uniqueIdentifier=TC_ESignet_GetLinkStatus_20, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_GetLinkStatus_Missing_RequestTime_Neg |
| Testcase Dependency |
| [TC_ESignet_OAuthDetailsRequestLinked_07, TC_ESignet_CreateOIDCClient_01, TC_ESignet_GenerateLinkCode_01, TC_ESignet_OAuthDetailsRequestLinked_01] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=ESignet_GetLinkStatus_Missing_RequestTime_Neg, endPoint=/v1/esignet/linked-authorization/link-status, role=resident, templateFields=null, input={ "requestTime": "$REMOVE$", "transactionId": "$ID:OAuthDetailsRequest_LinkAuth_Other_Valid_Smoke_sid_transactionId$", "linkCode": "$ID:GenerateLinkCode_all_Valid_Smoke_sid_linkCode$" }, output={ "errors": [ { "errorCode": "invalid_request" } ] }, inputTemplate=esignet/GetLinkStatus/GetLinkStatus, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Get link status without requestTime, uniqueIdentifier=TC_ESignet_GetLinkStatus_10, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_GetLinkStatus_Missing_TransactionId_Neg |
| Testcase Dependency |
| [TC_ESignet_GenerateLinkCode_01, TC_ESignet_OAuthDetailsRequestLinked_01, TC_ESignet_CreateOIDCClient_01] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=ESignet_GetLinkStatus_Missing_TransactionId_Neg, endPoint=/v1/esignet/linked-authorization/link-status, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "transactionId": "$REMOVE$", "linkCode": "$ID:GenerateLinkCode_all_Valid_Smoke_sid_linkCode$" }, output={ "errors": [ { "errorCode": "invalid_transaction_id" } ] }, inputTemplate=esignet/GetLinkStatus/GetLinkStatus, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Get link status without transactionId, uniqueIdentifier=TC_ESignet_GetLinkStatus_15, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_GetLinkStatus_Null_LinkCode_Neg |
| Testcase Dependency |
| [TC_ESignet_OAuthDetailsRequestLinked_07, TC_ESignet_CreateOIDCClient_01] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=ESignet_GetLinkStatus_Null_LinkCode_Neg, endPoint=/v1/esignet/linked-authorization/link-status, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_LinkAuth_Other_Valid_Smoke_sid_transactionId$", "linkCode": "null" }, output={ "errors": [ { "errorCode": "invalid_link_code" } ] }, inputTemplate=esignet/GetLinkStatus/GetLinkStatus, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Get link status with Null in linkCode, uniqueIdentifier=TC_ESignet_GetLinkStatus_22, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_GetLinkStatus_Null_TransactionId_Neg |
| Testcase Dependency |
| [TC_ESignet_GenerateLinkCode_01, TC_ESignet_OAuthDetailsRequestLinked_01, TC_ESignet_CreateOIDCClient_01] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=ESignet_GetLinkStatus_Null_TransactionId_Neg, endPoint=/v1/esignet/linked-authorization/link-status, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "transactionId": "null", "linkCode": "$ID:GenerateLinkCode_all_Valid_Smoke_sid_linkCode$" }, output={ "errors": [ { "errorCode": "invalid_link_code" } ] }, inputTemplate=esignet/GetLinkStatus/GetLinkStatus, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Get link status with Null in transactionId, uniqueIdentifier=TC_ESignet_GetLinkStatus_16, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_GetLinkStatus_Past_RequestTime_Neg |
| Testcase Dependency |
| [TC_ESignet_OAuthDetailsRequestLinked_07, TC_ESignet_CreateOIDCClient_01, TC_ESignet_GenerateLinkCode_01, TC_ESignet_OAuthDetailsRequestLinked_01] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=ESignet_GetLinkStatus_Past_RequestTime_Neg, endPoint=/v1/esignet/linked-authorization/link-status, role=resident, templateFields=null, input={ "requestTime": "2022-11-07T06:51:30.195Z", "transactionId": "$ID:OAuthDetailsRequest_LinkAuth_Other_Valid_Smoke_sid_transactionId$", "linkCode": "$ID:GenerateLinkCode_all_Valid_Smoke_sid_linkCode$" }, output={ "errors": [ { "errorCode": "invalid_request" } ] }, inputTemplate=esignet/GetLinkStatus/GetLinkStatus, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Get link status with past value in requestTime, uniqueIdentifier=TC_ESignet_GetLinkStatus_08, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_GetLinkStatus_SpaceVal_LinkCode_Neg |
| Testcase Dependency |
| [TC_ESignet_OAuthDetailsRequestLinked_07, TC_ESignet_CreateOIDCClient_01] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=ESignet_GetLinkStatus_SpaceVal_LinkCode_Neg, endPoint=/v1/esignet/linked-authorization/link-status, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_LinkAuth_Other_Valid_Smoke_sid_transactionId$", "linkCode": " " }, output={ "errors": [ { "errorCode": "invalid_link_code" } ] }, inputTemplate=esignet/GetLinkStatus/GetLinkStatus, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Get link status with space in linkCode, uniqueIdentifier=TC_ESignet_GetLinkStatus_23, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_GetLinkStatus_SpaceVal_RequestTime_Neg |
| Testcase Dependency |
| [TC_ESignet_OAuthDetailsRequestLinked_07, TC_ESignet_CreateOIDCClient_01, TC_ESignet_GenerateLinkCode_01, TC_ESignet_OAuthDetailsRequestLinked_01] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=ESignet_GetLinkStatus_SpaceVal_RequestTime_Neg, endPoint=/v1/esignet/linked-authorization/link-status, role=resident, templateFields=null, input={ "requestTime": " ", "transactionId": "$ID:OAuthDetailsRequest_LinkAuth_Other_Valid_Smoke_sid_transactionId$", "linkCode": "$ID:GenerateLinkCode_all_Valid_Smoke_sid_linkCode$" }, output={ "errors": [ { "errorCode": "invalid_request" } ] }, inputTemplate=esignet/GetLinkStatus/GetLinkStatus, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Get link status with only space in requestTime, uniqueIdentifier=TC_ESignet_GetLinkStatus_11, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_GetLinkStatus_SpaceVal_TransactionId_Neg |
| Testcase Dependency |
| [TC_ESignet_GenerateLinkCode_01, TC_ESignet_OAuthDetailsRequestLinked_01, TC_ESignet_CreateOIDCClient_01] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=ESignet_GetLinkStatus_SpaceVal_TransactionId_Neg, endPoint=/v1/esignet/linked-authorization/link-status, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "transactionId": " ", "linkCode": "$ID:GenerateLinkCode_all_Valid_Smoke_sid_linkCode$" }, output={ "errors": [ { "errorCode": "invalid_transaction_id" } ] }, inputTemplate=esignet/GetLinkStatus/GetLinkStatus, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Get link status with only space in transactionId, uniqueIdentifier=TC_ESignet_GetLinkStatus_17, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_GetLinkStatus_all_Valid_Smoke |
| Testcase Dependency |
| [TC_ESignet_GenerateLinkCode_01, TC_ESignet_OAuthDetailsRequestLinked_01, TC_ESignet_CreateOIDCClient_01] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=ESignet_GetLinkStatus_all_Valid_Smoke, endPoint=/v1/esignet/linked-authorization/link-status, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_LinkAuth_Valid_Smoke_sid_transactionId$", "linkCode": "$ID:GenerateLinkCode_all_Valid_Smoke_sid_linkCode$" }, output={ }, inputTemplate=esignet/GetLinkStatus/GetLinkStatus, outputTemplate=esignet/GetLinkStatus/GetLinkStatusResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Get link status with all valid details, uniqueIdentifier=TC_ESignet_GetLinkStatus_01, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_LinkedAuthenticationWla_Consent_SameClaim_Vid_SCert_all_Valid_Smoke_sid |
| Testcase Dependency |
| [] |
| Class Name |
| PostWithAutogenIdWithOtpGenerateForWla |
| Testcase Input |
| testCaseName=ESignet_LinkedAuthenticationWla_Consent_SameClaim_Vid_SCert_all_Valid_Smoke_sid, endPoint=/v1/esignet/linked-authorization/v2/authenticate, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "linkTransactionId": "$ID:LinkTransaction_Consent_Vid_SameClaim_all_Valid_Smoke_sid_linkTransactionId$", "individualId": "$ID:Generate_Perpetual_VID_Linked_Consent_Valid_Smoke_sid_vid$", "authFactorType": "WLA", "challenge": "$WLATOKENCONSENTVIDSAMECLAIM$", "format": "jwt", "sendOtp":{ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Linked_Consent_Valid_Smoke_sid_vid$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendBindingOtp/SendBindingOtp", "sendOtpEndPoint": "/v1/esignet/binding/binding-otp", }, "validateOtp":{ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Linked_Consent_Valid_Smoke_sid_vid$", "authFactorType1": "WLA", "format1": "jwt", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Linked_Consent_Vid_smoke_Pos_EMAIL$", "format": "alpha-numeric", "publicKey": "$BINDINGCONSENTSAMECLAIMVIDJWKKEY$", "validateOtpReqTemplate": "esignet/WalletBinding/WalletBinding", "validateOtpEndPoint": "/v1/esignet/binding/wallet-binding" } }, output={ "consentAction": "CAPTURE", "sendOtpResp":{ "sendOtpResTemplate":"esignet/SendBindingOtp/SendBindingOtpResult" }, "validateOtpResp":{ "sendOtpResTemplate":"esignet/WalletBinding/WalletBindingResult" } }, inputTemplate=esignet/LinkedAuthenticationWla/LinkedAuthenticationWla, outputTemplate=esignet/LinkedConsent/LinkedAuthenticationConsentWla/LinkedAuthenticationConsentWlaResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Linked AuthenticationWla consent same claim VID SCert all valid details, uniqueIdentifier=TC_ESignet_LinkedAuthenticationWla_02, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.PostWithAutogenIdWithOtpGenerateForWla.test(PostWithAutogenIdWithOtpGenerateForWla.java:92)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_LinkedAuthenticationWla_Consent_User2_Vid_SCert_all_Valid_Smoke_sid |
| Testcase Dependency |
| [] |
| Class Name |
| PostWithAutogenIdWithOtpGenerateForWla |
| Testcase Input |
| testCaseName=ESignet_LinkedAuthenticationWla_Consent_User2_Vid_SCert_all_Valid_Smoke_sid, endPoint=/v1/esignet/linked-authorization/v2/authenticate, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "linkTransactionId": "$ID:LinkTransaction_Consent_Vid_User2_all_Valid_Smoke_sid_linkTransactionId$", "individualId": "$ID:Generate_Perpetual_VID_Linked_Consent_User2_Valid_Smoke_sid_vid$", "authFactorType": "WLA", "challenge": "$WLATOKENCONSENTVIDUSER2$", "format": "jwt", "sendOtp":{ "apiKey": "$ID:GenerateApiKeyKyc_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_Kyc_Valid_Smoke_sid_partnerId$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Linked_Consent_User2_Valid_Smoke_sid_vid$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendBindingOtp/SendBindingOtp", "sendOtpEndPoint": "/v1/esignet/binding/binding-otp", }, "validateOtp":{ "apiKey": "$ID:GenerateApiKeyKyc_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_Kyc_Valid_Smoke_sid_partnerId$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Linked_Consent_User2_Valid_Smoke_sid_vid$", "authFactorType1": "WLA", "format1": "jwt", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Linked_Consent_User2_Vid_smoke_Pos_EMAIL$", "format": "alpha-numeric", "publicKey": "$BINDINGCONSENTVIDUSER2JWKKEY$", "validateOtpReqTemplate": "esignet/WalletBinding/WalletBinding", "validateOtpEndPoint": "/v1/esignet/binding/wallet-binding" } }, output={ "consentAction": "CAPTURE", "sendOtpResp":{ "sendOtpResTemplate":"esignet/SendBindingOtp/SendBindingOtpResult" }, "validateOtpResp":{ "sendOtpResTemplate":"esignet/WalletBinding/WalletBindingResult" } }, inputTemplate=esignet/LinkedAuthenticationWla/LinkedAuthenticationWla, outputTemplate=esignet/LinkedConsent/LinkedAuthenticationConsentWla/LinkedAuthenticationConsentWlaResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Linked AuthenticationWla consent User2 UIN SCert all valid details, uniqueIdentifier=TC_ESignet_LinkedAuthenticationWla_04, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.PostWithAutogenIdWithOtpGenerateForWla.test(PostWithAutogenIdWithOtpGenerateForWla.java:92)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_LinkedAuthenticationWla_Vid_SCert_all_Valid_Smoke_sid |
| Testcase Dependency |
| [] |
| Class Name |
| PostWithAutogenIdWithOtpGenerateForWla |
| Testcase Input |
| testCaseName=ESignet_LinkedAuthenticationWla_Vid_SCert_all_Valid_Smoke_sid, endPoint=/v1/esignet/linked-authorization/authenticate, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "linkTransactionId": "$ID:LinkTransaction_Vid_all_Valid_Smoke_sid_linkTransactionId$", "individualId": "$ID:Generate_Perpetual_VID_LinkedSce_Valid_Smoke_sid_vid$", "authFactorType": "WLA", "challenge": "$WLATOKENVID$", "format": "jwt", "sendOtp":{ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_LinkedSce_Valid_Smoke_sid_vid$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendBindingOtp/SendBindingOtp", "sendOtpEndPoint": "/v1/esignet/binding/binding-otp", }, "validateOtp":{ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_LinkedSce_Valid_Smoke_sid_vid$", "authFactorType1": "WLA", "format1": "jwt", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Linked_Sce_smoke_Pos_EMAIL$", "format": "alpha-numeric", "publicKey": "$BINDINGJWKKEYVID$", "validateOtpReqTemplate": "esignet/WalletBinding/WalletBinding", "validateOtpEndPoint": "/v1/esignet/binding/wallet-binding" } }, output={ "sendOtpResp":{ "sendOtpResTemplate":"esignet/SendBindingOtp/SendBindingOtpResult" }, "validateOtpResp":{ "sendOtpResTemplate":"esignet/WalletBinding/WalletBindingResult" } }, inputTemplate=esignet/LinkedAuthenticationWla/LinkedAuthenticationWla, outputTemplate=esignet/LinkedAuthenticationWla/LinkedAuthenticationWlaResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Linked AuthenticationWla VID SCert all valid details, uniqueIdentifier=TC_ESignet_LinkedAuthenticationWla_06, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.PostWithAutogenIdWithOtpGenerateForWla.test(PostWithAutogenIdWithOtpGenerateForWla.java:92)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_LinkedAuthenticationWla_Consent_SameClaim_uin_SCert_all_Valid_Smoke_sid |
| Testcase Dependency |
| [Esignet_PartnerSelfRegistration_All_Valid_Smoke_sid, Dependent_Idrepo_AddIdentity_10, TC_ESignet_LinkTransaction_05, TC_ESignet_GenerateLinkCode_05, TC_ESignet_OAuthDetailsRequestLinked_05, TC_ESignet_CreateOIDCClient_01, ESignet_GenerateApiKey_Valid_Smoke_sid] |
| Class Name |
| PostWithAutogenIdWithOtpGenerateForWla |
| Testcase Input |
| testCaseName=ESignet_LinkedAuthenticationWla_Consent_SameClaim_uin_SCert_all_Valid_Smoke_sid, endPoint=/v1/esignet/linked-authorization/v2/authenticate, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "linkTransactionId": "$ID:LinkTransaction_Consent_uin_SameClaim_all_Valid_Smoke_sid_linkTransactionId$", "individualId": "$ID:AddIdentity_Linked_Consent_smoke_Pos_UIN$", "authFactorType": "WLA", "challenge": "$WLATOKENCONSENTSAMECLAIM$", "format": "jwt", "sendOtp":{ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Linked_Consent_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendBindingOtp/SendBindingOtp", "sendOtpEndPoint": "/v1/esignet/binding/binding-otp", }, "validateOtp":{ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Linked_Consent_smoke_Pos_UIN$", "authFactorType1": "WLA", "format1": "jwt", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Linked_Consent_smoke_Pos_EMAIL$", "format": "alpha-numeric", "publicKey": "$BINDINGCONSENTSAMECLAIMJWKKEY$", "validateOtpReqTemplate": "esignet/WalletBinding/WalletBinding", "validateOtpEndPoint": "/v1/esignet/binding/wallet-binding" } }, output={ "consentAction": "CAPTURE", "sendOtpResp":{ "sendOtpResTemplate":"esignet/SendBindingOtp/SendBindingOtpResult" }, "validateOtpResp":{ "sendOtpResTemplate":"esignet/WalletBinding/WalletBindingResult" } }, inputTemplate=esignet/LinkedAuthenticationWla/LinkedAuthenticationWla, outputTemplate=esignet/LinkedConsent/LinkedAuthenticationConsentWla/LinkedAuthenticationConsentWlaResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Linked AuthenticationWla consent same claim UIN SCert all valid details, uniqueIdentifier=TC_ESignet_LinkedAuthenticationWla_01, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_LinkedAuthenticationWla_Consent_User2_uin_SCert_all_Valid_Smoke_sid |
| Testcase Dependency |
| [Esignet_PartnerSelfRegistration_Kyc_Valid_Smoke_sid, Dependent_Idrepo_AddIdentity_11, TC_ESignet_LinkTransaction_03, TC_ESignet_GenerateLinkCode_03, TC_ESignet_OAuthDetailsRequestLinked_03, ESignet_CreateOIDCClient_Misp_Valid_Smoke_sid, ESignet_GenerateApiKeyKyc_Valid_Smoke_sid] |
| Class Name |
| PostWithAutogenIdWithOtpGenerateForWla |
| Testcase Input |
| testCaseName=ESignet_LinkedAuthenticationWla_Consent_User2_uin_SCert_all_Valid_Smoke_sid, endPoint=/v1/esignet/linked-authorization/v2/authenticate, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "linkTransactionId": "$ID:LinkTransaction_Consent_uin_User2_all_Valid_Smoke_sid_linkTransactionId$", "individualId": "$ID:AddIdentity_Linked_Consent_User2_smoke_Pos_UIN$", "authFactorType": "WLA", "challenge": "$WLATOKENCONSENTUSER2$", "format": "jwt", "sendOtp":{ "apiKey": "$ID:GenerateApiKeyKyc_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_Kyc_Valid_Smoke_sid_partnerId$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Linked_Consent_User2_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendBindingOtp/SendBindingOtp", "sendOtpEndPoint": "/v1/esignet/binding/binding-otp", }, "validateOtp":{ "apiKey": "$ID:GenerateApiKeyKyc_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_Kyc_Valid_Smoke_sid_partnerId$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Linked_Consent_User2_smoke_Pos_UIN$", "authFactorType1": "WLA", "format1": "jwt", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Linked_Consent_User2_smoke_Pos_EMAIL$", "format": "alpha-numeric", "publicKey": "$BINDINGCONSENTUSER2JWKKEY$", "validateOtpReqTemplate": "esignet/WalletBinding/WalletBinding", "validateOtpEndPoint": "/v1/esignet/binding/wallet-binding" } }, output={ "consentAction": "CAPTURE", "sendOtpResp":{ "sendOtpResTemplate":"esignet/SendBindingOtp/SendBindingOtpResult" }, "validateOtpResp":{ "sendOtpResTemplate":"esignet/WalletBinding/WalletBindingResult" } }, inputTemplate=esignet/LinkedAuthenticationWla/LinkedAuthenticationWla, outputTemplate=esignet/LinkedConsent/LinkedAuthenticationConsentWla/LinkedAuthenticationConsentWlaResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Linked AuthenticationWla consent User2 UIN SCert all valid details, uniqueIdentifier=TC_ESignet_LinkedAuthenticationWla_03, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_LinkedAuthenticationWla_SCert_InvalidAcceptedClaim_sid |
| Testcase Dependency |
| [] |
| Class Name |
| PostWithAutogenIdWithOtpGenerateForWla |
| Testcase Input |
| testCaseName=ESignet_LinkedAuthenticationWla_SCert_InvalidAcceptedClaim_sid, endPoint=/v1/esignet/linked-authorization/authenticate, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "linkTransactionId": "$ID:LinkTransaction_forInvalidAcceptedClaim_sid_linkTransactionId$", "individualId": "$ID:AddIdentity_L2_Valid_Parameters_forInvalidAcceptedClaims_Pos_UIN$", "authFactorType": "WLA", "challenge": "$WLATOKENCONSENTACCEPTEDCLAIM$", "format": "jwt", "sendOtp":{ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_L2_Valid_Parameters_forInvalidAcceptedClaims_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendBindingOtp/SendBindingOtp", "sendOtpEndPoint": "/v1/esignet/binding/binding-otp", }, "validateOtp":{ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_L2_Valid_Parameters_forInvalidAcceptedClaims_Pos_UIN$", "authFactorType1": "WLA", "format1": "jwt", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_L2_Valid_Parameters_forInvalidAcceptedClaims_Pos_EMAIL$", "format": "alpha-numeric", "publicKey": "$BINDINGCONSENTACCEPTEDCLAIMJWKKEY$", "validateOtpReqTemplate": "esignet/WalletBinding/WalletBinding", "validateOtpEndPoint": "/v1/esignet/binding/wallet-binding" } }, output={ "sendOtpResp":{ "sendOtpResTemplate":"esignet/SendBindingOtp/SendBindingOtpResult" }, "validateOtpResp":{ "sendOtpResTemplate":"esignet/WalletBinding/WalletBindingResult" } }, inputTemplate=esignet/LinkedAuthenticationWla/LinkedAuthenticationWla, outputTemplate=esignet/LinkedAuthenticationWla/LinkedAuthenticationWlaResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Linked AuthenticationWla VID SCert all valid details, uniqueIdentifier=TC_ESignet_LinkedAuthenticationWla_07, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_LinkedAuthenticationWla_forEmptyAcceptedClaimIfRequestedIsOptional_SCert_sid |
| Testcase Dependency |
| [] |
| Class Name |
| PostWithAutogenIdWithOtpGenerateForWla |
| Testcase Input |
| testCaseName=ESignet_LinkedAuthenticationWla_forEmptyAcceptedClaimIfRequestedIsOptional_SCert_sid, endPoint=/v1/esignet/linked-authorization/authenticate, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "linkTransactionId": "$ID:LinkTransaction_forEmptyAcceptedClaimIfRequestedIsOptional_sid_linkTransactionId$", "individualId": "$ID:AddIdentity_L2_Valid_Parameters_forEmptyAcceptedClaimIfRequestedIsOptional_Pos_UIN$", "authFactorType": "WLA", "challenge": "$WLATOKENFORNULLACCEPTEDUSER1CLAIM$", "format": "jwt", "sendOtp":{ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_L2_Valid_Parameters_forEmptyAcceptedClaimIfRequestedIsOptional_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendBindingOtp/SendBindingOtp", "sendOtpEndPoint": "/v1/esignet/binding/binding-otp", }, "validateOtp":{ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_L2_Valid_Parameters_forEmptyAcceptedClaimIfRequestedIsOptional_Pos_UIN$", "authFactorType1": "WLA", "format1": "jwt", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_L2_Valid_Parameters_forEmptyAcceptedClaimIfRequestedIsOptional_Pos_EMAIL$", "format": "alpha-numeric", "publicKey": "$BINDINGFORNULLACCEPTEDUSER1CLAIMJWKKEY$", "validateOtpReqTemplate": "esignet/WalletBinding/WalletBinding", "validateOtpEndPoint": "/v1/esignet/binding/wallet-binding" } }, output={ "sendOtpResp":{ "sendOtpResTemplate":"esignet/SendBindingOtp/SendBindingOtpResult" }, "validateOtpResp":{ "sendOtpResTemplate":"esignet/WalletBinding/WalletBindingResult" } }, inputTemplate=esignet/LinkedAuthenticationWla/LinkedAuthenticationWla, outputTemplate=esignet/LinkedAuthenticationWla/LinkedAuthenticationWlaResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Linked AuthenticationWla for EmptyAcceptedClaimIfRequestedIsOptional, uniqueIdentifier=TC_ESignet_LinkedAuthenticationWla_13, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_LinkedAuthenticationWla_forEmptyAsAcceptedClaim_EseentialClaim_SCert_sid |
| Testcase Dependency |
| [] |
| Class Name |
| PostWithAutogenIdWithOtpGenerateForWla |
| Testcase Input |
| testCaseName=ESignet_LinkedAuthenticationWla_forEmptyAsAcceptedClaim_EseentialClaim_SCert_sid, endPoint=/v1/esignet/linked-authorization/authenticate, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "linkTransactionId": "$ID:LinkTransaction_forEmptyAsAcceptedClaim_EseentialClaim_sid_linkTransactionId$", "individualId": "$ID:AddIdentity_L2_Valid_Parameters_forEmptyAsAcceptedClaim_Pos_UIN$", "authFactorType": "WLA", "challenge": "$WLATOKENFORNULLESSENTIALUSER1CLAIM$", "format": "jwt", "sendOtp":{ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_L2_Valid_Parameters_forEmptyAsAcceptedClaim_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendBindingOtp/SendBindingOtp", "sendOtpEndPoint": "/v1/esignet/binding/binding-otp", }, "validateOtp":{ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_L2_Valid_Parameters_forEmptyAsAcceptedClaim_Pos_UIN$", "authFactorType1": "WLA", "format1": "jwt", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_L2_Valid_Parameters_forEmptyAsAcceptedClaim_Pos_EMAIL$", "format": "alpha-numeric", "publicKey": "$BINDINGFORNULLESSENTIALUSER1CLAIMJWKKEY$", "validateOtpReqTemplate": "esignet/WalletBinding/WalletBinding", "validateOtpEndPoint": "/v1/esignet/binding/wallet-binding" } }, output={ "sendOtpResp":{ "sendOtpResTemplate":"esignet/SendBindingOtp/SendBindingOtpResult" }, "validateOtpResp":{ "sendOtpResTemplate":"esignet/WalletBinding/WalletBindingResult" } }, inputTemplate=esignet/LinkedAuthenticationWla/LinkedAuthenticationWla, outputTemplate=esignet/LinkedAuthenticationWla/LinkedAuthenticationWlaResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Linked AuthenticationWla VID SCert all valid details, uniqueIdentifier=TC_ESignet_LinkedAuthenticationWla_11, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_LinkedAuthenticationWla_forOnlyEseentialClaim_SCert_sid |
| Testcase Dependency |
| [] |
| Class Name |
| PostWithAutogenIdWithOtpGenerateForWla |
| Testcase Input |
| testCaseName=ESignet_LinkedAuthenticationWla_forOnlyEseentialClaim_SCert_sid, endPoint=/v1/esignet/linked-authorization/authenticate, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "linkTransactionId": "$ID:LinkTransaction_forOnlyEseentialClaim_sid_linkTransactionId$", "individualId": "$ID:AddIdentity_L2_Valid_Parameters_ForOnlyEssentialclaims_Pos_UIN$", "authFactorType": "WLA", "challenge": "$WLATOKENFORONLYESSENTIALUSER1CLAIM$", "format": "jwt", "sendOtp":{ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_L2_Valid_Parameters_ForOnlyEssentialclaims_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendBindingOtp/SendBindingOtp", "sendOtpEndPoint": "/v1/esignet/binding/binding-otp", }, "validateOtp":{ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_L2_Valid_Parameters_ForOnlyEssentialclaims_Pos_UIN$", "authFactorType1": "WLA", "format1": "jwt", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_L2_Valid_Parameters_ForOnlyEssentialclaims_Pos_EMAIL$", "format": "alpha-numeric", "publicKey": "$BINDINGFORONLYESSENTIALUSER1CLAIMJWKKEY$", "validateOtpReqTemplate": "esignet/WalletBinding/WalletBinding", "validateOtpEndPoint": "/v1/esignet/binding/wallet-binding" } }, output={ "sendOtpResp":{ "sendOtpResTemplate":"esignet/SendBindingOtp/SendBindingOtpResult" }, "validateOtpResp":{ "sendOtpResTemplate":"esignet/WalletBinding/WalletBindingResult" } }, inputTemplate=esignet/LinkedAuthenticationWla/LinkedAuthenticationWla, outputTemplate=esignet/LinkedAuthenticationWla/LinkedAuthenticationWlaResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Linked AuthenticationWla VID SCert all valid details, uniqueIdentifier=TC_ESignet_LinkedAuthenticationWla_10, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_LinkedAuthenticationWla_forOnlyOptionalClaimIfRequestedOptional_SCert_sid |
| Testcase Dependency |
| [] |
| Class Name |
| PostWithAutogenIdWithOtpGenerateForWla |
| Testcase Input |
| testCaseName=ESignet_LinkedAuthenticationWla_forOnlyOptionalClaimIfRequestedOptional_SCert_sid, endPoint=/v1/esignet/linked-authorization/authenticate, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "linkTransactionId": "$ID:LinkTransaction_forOnlyOptionalClaimIfRequestedOptional_sid_linkTransactionId$", "individualId": "$ID:AddIdentity_L2_Valid_Parameters_forOnlyOptionalClaimIfRequestedOptional_Pos_UIN$", "authFactorType": "WLA", "challenge": "$WLATOKENFOROPTIONALACCEPTEDUSER1CLAIM$", "format": "jwt", "sendOtp":{ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_L2_Valid_Parameters_forOnlyOptionalClaimIfRequestedOptional_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendBindingOtp/SendBindingOtp", "sendOtpEndPoint": "/v1/esignet/binding/binding-otp", }, "validateOtp":{ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_L2_Valid_Parameters_forOnlyOptionalClaimIfRequestedOptional_Pos_UIN$", "authFactorType1": "WLA", "format1": "jwt", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_L2_Valid_Parameters_forOnlyOptionalClaimIfRequestedOptional_Pos_EMAIL$", "format": "alpha-numeric", "publicKey": "$BINDINGFOROPTIONALACCEPTEDUSER1CLAIMJWKKEY$", "validateOtpReqTemplate": "esignet/WalletBinding/WalletBinding", "validateOtpEndPoint": "/v1/esignet/binding/wallet-binding" } }, output={ "sendOtpResp":{ "sendOtpResTemplate":"esignet/SendBindingOtp/SendBindingOtpResult" }, "validateOtpResp":{ "sendOtpResTemplate":"esignet/WalletBinding/WalletBindingResult" } }, inputTemplate=esignet/LinkedAuthenticationWla/LinkedAuthenticationWla, outputTemplate=esignet/LinkedAuthenticationWla/LinkedAuthenticationWlaResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Linked AuthenticationWla VID SCert all valid details, uniqueIdentifier=TC_ESignet_LinkedAuthenticationWla_12, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_LinkedAuthenticationWla_forPartialEseentialAndOptionalClaim_SCert_sid |
| Testcase Dependency |
| [] |
| Class Name |
| PostWithAutogenIdWithOtpGenerateForWla |
| Testcase Input |
| testCaseName=ESignet_LinkedAuthenticationWla_forPartialEseentialAndOptionalClaim_SCert_sid, endPoint=/v1/esignet/linked-authorization/authenticate, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "linkTransactionId": "$ID:LinkTransaction_forPartialEseentialAndOptionalClaim_sid_linkTransactionId$", "individualId": "$ID:AddIdentity_L2_Valid_Parameters_ForPartialEseentialAndOptionalClaim_Pos_UIN$", "authFactorType": "WLA", "challenge": "$WLATOKENFORPARTIALESSENTIALOPTIONALUSER1CLAIM$", "format": "jwt", "sendOtp":{ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_L2_Valid_Parameters_ForPartialEseentialAndOptionalClaim_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendBindingOtp/SendBindingOtp", "sendOtpEndPoint": "/v1/esignet/binding/binding-otp", }, "validateOtp":{ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_L2_Valid_Parameters_ForPartialEseentialAndOptionalClaim_Pos_UIN$", "authFactorType1": "WLA", "format1": "jwt", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_L2_Valid_Parameters_ForPartialEseentialAndOptionalClaim_Pos_EMAIL$", "format": "alpha-numeric", "publicKey": "$BINDINGFORPARTIALESSENTIALOPTIONALUSER1CLAIMJWKKEY$", "validateOtpReqTemplate": "esignet/WalletBinding/WalletBinding", "validateOtpEndPoint": "/v1/esignet/binding/wallet-binding" } }, output={ "sendOtpResp":{ "sendOtpResTemplate":"esignet/SendBindingOtp/SendBindingOtpResult" }, "validateOtpResp":{ "sendOtpResTemplate":"esignet/WalletBinding/WalletBindingResult" } }, inputTemplate=esignet/LinkedAuthenticationWla/LinkedAuthenticationWla, outputTemplate=esignet/LinkedAuthenticationWla/LinkedAuthenticationWlaResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Linked AuthenticationWla VID SCert all valid details, uniqueIdentifier=TC_ESignet_LinkedAuthenticationWla_09, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_LinkedAuthenticationWla_uin_SCert_all_Valid_Smoke_sid |
| Testcase Dependency |
| [Esignet_PartnerSelfRegistration_All_Valid_Smoke_sid, ESignet_GenerateApiKey_Valid_Smoke_sid, Dependent_Idrepo_AddIdentity_09, TC_ESignet_LinkTransaction_01, TC_ESignet_GenerateLinkCode_01, TC_ESignet_OAuthDetailsRequestLinked_01, TC_ESignet_CreateOIDCClient_01] |
| Class Name |
| PostWithAutogenIdWithOtpGenerateForWla |
| Testcase Input |
| testCaseName=ESignet_LinkedAuthenticationWla_uin_SCert_all_Valid_Smoke_sid, endPoint=/v1/esignet/linked-authorization/authenticate, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "linkTransactionId": "$ID:LinkTransaction_all_Valid_Smoke_sid_linkTransactionId$", "individualId": "$ID:AddIdentity_Linked_Sce_smoke_Pos_UIN$", "authFactorType": "WLA", "challenge": "$WLATOKEN$", "format": "jwt", "sendOtp":{ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Linked_Sce_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendBindingOtp/SendBindingOtp", "sendOtpEndPoint": "/v1/esignet/binding/binding-otp", }, "validateOtp":{ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Linked_Sce_smoke_Pos_UIN$", "authFactorType1": "WLA", "format1": "jwt", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Linked_Sce_smoke_Pos_EMAIL$", "format": "alpha-numeric", "publicKey": "$BINDINGJWKKEY$", "validateOtpReqTemplate": "esignet/WalletBinding/WalletBinding", "validateOtpEndPoint": "/v1/esignet/binding/wallet-binding" } }, output={ "sendOtpResp":{ "sendOtpResTemplate":"esignet/SendBindingOtp/SendBindingOtpResult" }, "validateOtpResp":{ "sendOtpResTemplate":"esignet/WalletBinding/WalletBindingResult" } }, inputTemplate=esignet/LinkedAuthenticationWla/LinkedAuthenticationWla, outputTemplate=esignet/LinkedAuthenticationWla/LinkedAuthenticationWlaResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Linked AuthenticationWla UIN SCert all valid details, uniqueIdentifier=TC_ESignet_LinkedAuthenticationWla_05, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_LinkedAuthenticationWla_withOnlyOptionalClaim_IfEssAndOptAsRequestedClaim_SCert_sid |
| Testcase Dependency |
| [] |
| Class Name |
| PostWithAutogenIdWithOtpGenerateForWla |
| Testcase Input |
| testCaseName=ESignet_LinkedAuthenticationWla_withOnlyOptionalClaim_IfEssAndOptAsRequestedClaim_SCert_sid, endPoint=/v1/esignet/linked-authorization/authenticate, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "linkTransactionId": "$ID:LinkTransaction_withOnlyOptionalClaim_IfEssAndOptAsRequestedClaim_sid_linkTransactionId$", "individualId": "$ID:AddIdentity_L2_Valid_Parameters_OnlyOptionalClaim_IfEssAndOptAsRequestedClaim_Pos_UIN$", "authFactorType": "WLA", "challenge": "$WLATOKENFOROPTIONALUSER1CLAIM$", "format": "jwt", "sendOtp":{ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_L2_Valid_Parameters_OnlyOptionalClaim_IfEssAndOptAsRequestedClaim_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendBindingOtp/SendBindingOtp", "sendOtpEndPoint": "/v1/esignet/binding/binding-otp", }, "validateOtp":{ "apiKey": "$ID:GenerateApiKey_Valid_Smoke_sid_apiKey$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_L2_Valid_Parameters_OnlyOptionalClaim_IfEssAndOptAsRequestedClaim_Pos_UIN$", "authFactorType1": "WLA", "format1": "jwt", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_L2_Valid_Parameters_OnlyOptionalClaim_IfEssAndOptAsRequestedClaim_Pos_EMAIL$", "format": "alpha-numeric", "publicKey": "$BINDINGFOROPTIONALUSER1CLAIMJWKKEY$", "validateOtpReqTemplate": "esignet/WalletBinding/WalletBinding", "validateOtpEndPoint": "/v1/esignet/binding/wallet-binding" } }, output={ "sendOtpResp":{ "sendOtpResTemplate":"esignet/SendBindingOtp/SendBindingOtpResult" }, "validateOtpResp":{ "sendOtpResTemplate":"esignet/WalletBinding/WalletBindingResult" } }, inputTemplate=esignet/LinkedAuthenticationWla/LinkedAuthenticationWla, outputTemplate=esignet/LinkedAuthenticationWla/LinkedAuthenticationWlaResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Linked AuthenticationWla VID SCert all valid details, uniqueIdentifier=TC_ESignet_LinkedAuthenticationWla_08, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_LinkedAuthorizationConsent_Consent_Vid_SameClaim_Smoke_Pos |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=ESignet_LinkedAuthorizationConsent_Consent_Vid_SameClaim_Smoke_Pos, endPoint=/v1/esignet/linked-authorization/v2/consent, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "linkedTransactionId": "$ID:LinkTransaction_Consent_Vid_SameClaim_all_Valid_Smoke_sid_linkTransactionId$", "acceptedClaims": [{claim: "name"},{claim: "gender"},{claim: "email"}], "signature": "$CONSENTDETACHEDSIGNATUREVIDSAMECLAIM$" }, output={ }, inputTemplate=esignet/LinkedConsent/LinkAuthorizationConsent/LinkAuthorizationConsent, outputTemplate=esignet/LinkedAuthorizationConsent/LinkedAuthorizationConsentResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Linked authorization consent with same claim VID, uniqueIdentifier=TC_ESignet_LinkedAuthorizationConsent_02, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePost.test(SimplePost.java:98)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_LinkedAuthorizationConsent_Consent_Vid_User2_Smoke_Pos |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=ESignet_LinkedAuthorizationConsent_Consent_Vid_User2_Smoke_Pos, endPoint=/v1/esignet/linked-authorization/v2/consent, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "linkedTransactionId": "$ID:LinkTransaction_Consent_Vid_User2_all_Valid_Smoke_sid_linkTransactionId$", "acceptedClaims": [{claim: "name"},{claim: "gender"},{claim: "email"}], "signature": "$CONSENTDETACHEDSIGNATUREVIDUSER2$" }, output={ }, inputTemplate=esignet/LinkedConsent/LinkAuthorizationConsent/LinkAuthorizationConsent, outputTemplate=esignet/LinkedAuthorizationConsent/LinkedAuthorizationConsentResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Linked authorization consent with User2 VID, uniqueIdentifier=TC_ESignet_LinkedAuthorizationConsent_04, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePost.test(SimplePost.java:98)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_LinkedAuthorizationConsent_Vid_All_Valid_Smoke_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=ESignet_LinkedAuthorizationConsent_Vid_All_Valid_Smoke_sid, endPoint=/v1/esignet/linked-authorization/consent, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "linkedTransactionId": "$ID:LinkTransaction_Vid_all_Valid_Smoke_sid_linkTransactionId$", "acceptedClaims": [{claim: "name"},{claim: "gender"},{claim: "email"}] }, output={ }, inputTemplate=esignet/LinkedAuthorizationConsent/LinkedAuthorizationConsent, outputTemplate=esignet/LinkedAuthorizationConsent/LinkedAuthorizationConsentResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Linked authorization consent with all valid details VID, uniqueIdentifier=TC_ESignet_LinkedAuthorizationConsent_06, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePost.test(SimplePost.java:98)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_LinkedAuthorizationConsent_All_Valid_Smoke_sid |
| Testcase Dependency |
| [TC_ESignet_LinkTransaction_01, TC_ESignet_GenerateLinkCode_01, TC_ESignet_OAuthDetailsRequestLinked_01, TC_ESignet_CreateOIDCClient_01] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=ESignet_LinkedAuthorizationConsent_All_Valid_Smoke_sid, endPoint=/v1/esignet/linked-authorization/consent, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "linkedTransactionId": "$ID:LinkTransaction_all_Valid_Smoke_sid_linkTransactionId$", "acceptedClaims": [{claim: "name"},{claim: "gender"},{claim: "email"}] }, output={ }, inputTemplate=esignet/LinkedAuthorizationConsent/LinkedAuthorizationConsent, outputTemplate=esignet/LinkedAuthorizationConsent/LinkedAuthorizationConsentResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Linked authorization consent with all valid details, uniqueIdentifier=TC_ESignet_LinkedAuthorizationConsent_05, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_LinkedAuthorizationConsent_Consent_uin_SameClaim_Smoke_Pos |
| Testcase Dependency |
| [TC_ESignet_LinkTransaction_05, TC_ESignet_GenerateLinkCode_05, TC_ESignet_OAuthDetailsRequestLinked_05, TC_ESignet_CreateOIDCClient_01, TC_ESignet_LinkTransactionConsent_01, TC_ESignet_GenerateLinkCodeConsent_01, ESignet_OAuthDetailsRequest_LinkAuth_Consent_Valid_Smoke_sid] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=ESignet_LinkedAuthorizationConsent_Consent_uin_SameClaim_Smoke_Pos, endPoint=/v1/esignet/linked-authorization/v2/consent, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "linkedTransactionId": "$ID:LinkTransaction_Consent_uin_SameClaim_all_Valid_Smoke_sid_linkTransactionId$", "acceptedClaims": [{claim: "name"},{claim: "email"}], "signature": "$CONSENTDETACHEDSIGNATURESAMECLAIM$" }, output={ }, inputTemplate=esignet/LinkedConsent/LinkAuthorizationConsent/LinkAuthorizationConsent, outputTemplate=esignet/LinkedAuthorizationConsent/LinkedAuthorizationConsentResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Linked authorization consent with same claim UIN, uniqueIdentifier=TC_ESignet_LinkedAuthorizationConsent_01, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_LinkedAuthorizationConsent_Consent_uin_User2_Smoke_Pos |
| Testcase Dependency |
| [TC_ESignet_LinkTransaction_03, TC_ESignet_GenerateLinkCode_03, TC_ESignet_OAuthDetailsRequestLinked_03, ESignet_CreateOIDCClient_Misp_Valid_Smoke_sid] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=ESignet_LinkedAuthorizationConsent_Consent_uin_User2_Smoke_Pos, endPoint=/v1/esignet/linked-authorization/v2/consent, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "linkedTransactionId": "$ID:LinkTransaction_Consent_uin_User2_all_Valid_Smoke_sid_linkTransactionId$", "acceptedClaims": [{claim: "name"},{claim: "email"}], "signature": "$CONSENTDETACHEDSIGNATUREUSER2$" }, output={ }, inputTemplate=esignet/LinkedConsent/LinkAuthorizationConsent/LinkAuthorizationConsent, outputTemplate=esignet/LinkedAuthorizationConsent/LinkedAuthorizationConsentResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Linked authorization consent with User2 UIN, uniqueIdentifier=TC_ESignet_LinkedAuthorizationConsent_03, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_LinkedAuthorizationConsent_Empty_TransactionId_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=ESignet_LinkedAuthorizationConsent_Empty_TransactionId_Neg, endPoint=/v1/esignet/linked-authorization/consent, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "linkedTransactionId": "" }, output={ "errors": [ { "errorCode": "invalid_transaction_id" } ] }, inputTemplate=esignet/LinkedAuthorizationConsent/LinkedAuthorizationConsent, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Linked authorization consent with empty transactionId, uniqueIdentifier=TC_ESignet_LinkedAuthorizationConsent_14, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_LinkedAuthorizationConsent_Empty_Val_RequestTime_Neg |
| Testcase Dependency |
| [TC_ESignet_LinkTransaction_01, TC_ESignet_GenerateLinkCode_01, TC_ESignet_OAuthDetailsRequestLinked_01, TC_ESignet_CreateOIDCClient_01] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=ESignet_LinkedAuthorizationConsent_Empty_Val_RequestTime_Neg, endPoint=/v1/esignet/linked-authorization/consent, role=resident, templateFields=null, input={ "requestTime": "", "linkedTransactionId": "$ID:LinkTransaction_all_Valid_Smoke_sid_linkTransactionId$" }, output={ "errors": [ { "errorCode": "invalid_request" } ] }, inputTemplate=esignet/LinkedAuthorizationConsent/LinkedAuthorizationConsent, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Linked authorization consent with empty value in requestTime, uniqueIdentifier=TC_ESignet_LinkedAuthorizationConsent_11, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_LinkedAuthorizationConsent_Future_Val_RequestTime_Neg |
| Testcase Dependency |
| [TC_ESignet_LinkTransaction_01, TC_ESignet_GenerateLinkCode_01, TC_ESignet_OAuthDetailsRequestLinked_01, TC_ESignet_CreateOIDCClient_01] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=ESignet_LinkedAuthorizationConsent_Future_Val_RequestTime_Neg, endPoint=/v1/esignet/linked-authorization/consent, role=resident, templateFields=null, input={ "requestTime": "2024-01-16T00:17:54.649Z", "linkedTransactionId": "$ID:LinkTransaction_all_Valid_Smoke_sid_linkTransactionId$" }, output={ "errors": [ { "errorCode": "invalid_request" } ] }, inputTemplate=esignet/LinkedAuthorizationConsent/LinkedAuthorizationConsent, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Linked authorization consent with future value in requestTime, uniqueIdentifier=TC_ESignet_LinkedAuthorizationConsent_09, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_LinkedAuthorizationConsent_InvalidAcceptedClaim |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=ESignet_LinkedAuthorizationConsent_InvalidAcceptedClaim, endPoint=/v1/esignet/linked-authorization/v2/consent, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "linkedTransactionId": "$ID:LinkTransaction_forInvalidAcceptedClaim_sid_linkTransactionId$", "acceptedClaims": [{claim: "residenceStatus"}], "signature": "$CONSENTDETACHEDSIGNATUREACCEPTEDCLAIM$" }, output={ "errors": [ { "errorCode": "invalid_accepted_claim" } ] }, inputTemplate=esignet/LinkedConsent/LinkAuthorizationConsent/LinkAuthorizationConsent, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Linked authorization consent with InvalidAcceptedClaim, uniqueIdentifier=TC_ESignet_LinkedAuthorizationConsent_20, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_LinkedAuthorizationConsent_Invalid_AcceptedClaims_Neg |
| Testcase Dependency |
| [TC_ESignet_LinkTransaction_01, TC_ESignet_GenerateLinkCode_01, TC_ESignet_OAuthDetailsRequestLinked_01, TC_ESignet_CreateOIDCClient_01] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=ESignet_LinkedAuthorizationConsent_Invalid_AcceptedClaims_Neg, endPoint=/v1/esignet/linked-authorization/consent, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "linkedTransactionId": "$ID:LinkTransaction_all_Valid_Smoke_sid_linkTransactionId$", "acceptedClaims": [{claim: "$E23Teda"}] }, output={ "errors": [ { "errorCode": "invalid_transaction" } ] }, inputTemplate=esignet/LinkedAuthorizationConsent/LinkedAuthorizationConsent, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Linked authorization consent with invalid accepted claims, uniqueIdentifier=TC_ESignet_LinkedAuthorizationConsent_16, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_LinkedAuthorizationConsent_Invalid_RequestTime_Neg |
| Testcase Dependency |
| [TC_ESignet_LinkTransaction_01, TC_ESignet_GenerateLinkCode_01, TC_ESignet_OAuthDetailsRequestLinked_01, TC_ESignet_CreateOIDCClient_01] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=ESignet_LinkedAuthorizationConsent_Invalid_RequestTime_Neg, endPoint=/v1/esignet/linked-authorization/consent, role=resident, templateFields=null, input={ "requestTime": "2022-11-08T06:35:53", "linkedTransactionId": "$ID:LinkTransaction_all_Valid_Smoke_sid_linkTransactionId$" }, output={ "errors": [ { "errorCode": "invalid_request" } ] }, inputTemplate=esignet/LinkedAuthorizationConsent/LinkedAuthorizationConsent, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Linked authorization consent with invalid requestTime, uniqueIdentifier=TC_ESignet_LinkedAuthorizationConsent_07, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_LinkedAuthorizationConsent_Invalid_TransactionId_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=ESignet_LinkedAuthorizationConsent_Invalid_TransactionId_Neg, endPoint=/v1/esignet/linked-authorization/consent, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "linkedTransactionId": "!$j6" }, output={ "errors": [ { "errorCode": "invalid_transaction" } ] }, inputTemplate=esignet/LinkedAuthorizationConsent/LinkedAuthorizationConsent, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Linked authorization consent with invalid transactionId, uniqueIdentifier=TC_ESignet_LinkedAuthorizationConsent_12, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_LinkedAuthorizationConsent_Invalid_permittedAuthorizeScopes_Neg |
| Testcase Dependency |
| [TC_ESignet_LinkTransaction_01, TC_ESignet_GenerateLinkCode_01, TC_ESignet_OAuthDetailsRequestLinked_01, TC_ESignet_CreateOIDCClient_01] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=ESignet_LinkedAuthorizationConsent_Invalid_permittedAuthorizeScopes_Neg, endPoint=/v1/esignet/linked-authorization/consent, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "linkedTransactionId": "$ID:LinkTransaction_all_Valid_Smoke_sid_linkTransactionId$", "permittedAuthorizeScopes": [{scope: "$absc34"}], "acceptedClaims": [{claim: "name"},{claim: "gender"},{claim: "email"}] }, output={ "errors": [ { "errorCode": "invalid_transaction" } ] }, inputTemplate=esignet/LinkedAuthorizationConsent/LinkedAuthorizationConsent, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Linked authorization consent with invalid accepted claims, uniqueIdentifier=TC_ESignet_LinkedAuthorizationConsent_18, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_LinkedAuthorizationConsent_Missing_TransactionId_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=ESignet_LinkedAuthorizationConsent_Missing_TransactionId_Neg, endPoint=/v1/esignet/linked-authorization/consent, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "linkedTransactionId": "$REMOVE$" }, output={ "errors": [ { "errorCode": "invalid_transaction_id" } ] }, inputTemplate=esignet/LinkedAuthorizationConsent/LinkedAuthorizationConsent, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Linked authorization consent without transactionId, uniqueIdentifier=TC_ESignet_LinkedAuthorizationConsent_13, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_LinkedAuthorizationConsent_Null_AcceptedClaims_Neg |
| Testcase Dependency |
| [TC_ESignet_LinkTransaction_01, TC_ESignet_GenerateLinkCode_01, TC_ESignet_OAuthDetailsRequestLinked_01, TC_ESignet_CreateOIDCClient_01] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=ESignet_LinkedAuthorizationConsent_Null_AcceptedClaims_Neg, endPoint=/v1/esignet/linked-authorization/consent, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "linkedTransactionId": "$ID:LinkTransaction_all_Valid_Smoke_sid_linkTransactionId$", "acceptedClaims": [{claim: "null"}] }, output={ "errors": [ { "errorCode": "invalid_transaction" } ] }, inputTemplate=esignet/LinkedAuthorizationConsent/LinkedAuthorizationConsent, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Linked authorization consent with Null in accepted claims, uniqueIdentifier=TC_ESignet_LinkedAuthorizationConsent_17, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_LinkedAuthorizationConsent_Null_permittedAuthorizeScopes_Neg |
| Testcase Dependency |
| [TC_ESignet_LinkTransaction_01, TC_ESignet_GenerateLinkCode_01, TC_ESignet_OAuthDetailsRequestLinked_01, TC_ESignet_CreateOIDCClient_01] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=ESignet_LinkedAuthorizationConsent_Null_permittedAuthorizeScopes_Neg, endPoint=/v1/esignet/linked-authorization/consent, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "linkedTransactionId": "$ID:LinkTransaction_all_Valid_Smoke_sid_linkTransactionId$", "permittedAuthorizeScopes": [{scope: "null"}], "acceptedClaims": [{claim: "name"},{claim: "gender"},{claim: "email"}] }, output={ "errors": [ { "errorCode": "invalid_transaction" } ] }, inputTemplate=esignet/LinkedAuthorizationConsent/LinkedAuthorizationConsent, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Linked authorization consent with Null in permittedAuthorizeScopes, uniqueIdentifier=TC_ESignet_LinkedAuthorizationConsent_19, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_LinkedAuthorizationConsent_Past_Val_RequestTime_Neg |
| Testcase Dependency |
| [TC_ESignet_LinkTransaction_01, TC_ESignet_GenerateLinkCode_01, TC_ESignet_OAuthDetailsRequestLinked_01, TC_ESignet_CreateOIDCClient_01] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=ESignet_LinkedAuthorizationConsent_Past_Val_RequestTime_Neg, endPoint=/v1/esignet/linked-authorization/consent, role=resident, templateFields=null, input={ "requestTime": "2023-01-16T00:17:54.649Z", "linkedTransactionId": "$ID:LinkTransaction_all_Valid_Smoke_sid_linkTransactionId$" }, output={ "errors": [ { "errorCode": "invalid_request" } ] }, inputTemplate=esignet/LinkedAuthorizationConsent/LinkedAuthorizationConsent, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Linked authorization consent with past value in requestTime, uniqueIdentifier=TC_ESignet_LinkedAuthorizationConsent_08, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_LinkedAuthorizationConsent_Space_Val_RequestTime_Neg |
| Testcase Dependency |
| [TC_ESignet_LinkTransaction_01, TC_ESignet_GenerateLinkCode_01, TC_ESignet_OAuthDetailsRequestLinked_01, TC_ESignet_CreateOIDCClient_01] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=ESignet_LinkedAuthorizationConsent_Space_Val_RequestTime_Neg, endPoint=/v1/esignet/linked-authorization/consent, role=resident, templateFields=null, input={ "requestTime": " ", "linkedTransactionId": "$ID:LinkTransaction_all_Valid_Smoke_sid_linkTransactionId$" }, output={ "errors": [ { "errorCode": "invalid_request" } ] }, inputTemplate=esignet/LinkedAuthorizationConsent/LinkedAuthorizationConsent, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Linked authorization consent with only space in requestTime, uniqueIdentifier=TC_ESignet_LinkedAuthorizationConsent_10, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_LinkedAuthorizationConsent_Space_Val_TransactionId_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=ESignet_LinkedAuthorizationConsent_Space_Val_TransactionId_Neg, endPoint=/v1/esignet/linked-authorization/consent, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "linkedTransactionId": " " }, output={ "errors": [ { "errorCode": "invalid_transaction_id" } ] }, inputTemplate=esignet/LinkedAuthorizationConsent/LinkedAuthorizationConsent, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Linked authorization consent with space in transactionId, uniqueIdentifier=TC_ESignet_LinkedAuthorizationConsent_15, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_LinkedAuthorizationConsent_forEmptyAcceptedClaimIfRequestedIsOptional_Pos |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=ESignet_LinkedAuthorizationConsent_forEmptyAcceptedClaimIfRequestedIsOptional_Pos, endPoint=/v1/esignet/linked-authorization/v2/consent, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "linkedTransactionId": "$ID:LinkTransaction_forEmptyAcceptedClaimIfRequestedIsOptional_sid_linkTransactionId$", "acceptedClaims": [], "signature": "$CONSENTDETACHEDSIGNATUREFORNULLACCEPTEDUSER1CLAIM$" }, output={ }, inputTemplate=esignet/LinkedConsent/LinkAuthorizationConsent/LinkAuthorizationConsent, outputTemplate=esignet/LinkedAuthorizationConsent/LinkedAuthorizationConsentResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Linked authorization consent for Empty Accepted Claim If Requested Is Optional, uniqueIdentifier=TC_ESignet_LinkedAuthorizationConsent_26, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_LinkedAuthorizationConsent_forEmptyAsAcceptedClaim_EseentialClaim |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=ESignet_LinkedAuthorizationConsent_forEmptyAsAcceptedClaim_EseentialClaim, endPoint=/v1/esignet/linked-authorization/v2/consent, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "linkedTransactionId": "$ID:LinkTransaction_forEmptyAsAcceptedClaim_EseentialClaim_sid_linkTransactionId$", "acceptedClaims": [], "signature": "$CONSENTDETACHEDSIGNATUREFORNULLESSENTIALUSER1CLAIM$" }, output={ "errors": [ { "errorCode": "invalid_accepted_claim" } ] }, inputTemplate=esignet/LinkedConsent/LinkAuthorizationConsent/LinkAuthorizationConsent, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Linked authorization consent for EmptyAsAcceptedClaim_EseentialClaim, uniqueIdentifier=TC_ESignet_LinkedAuthorizationConsent_24, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_LinkedAuthorizationConsent_forOnlyEseentialClaim_Pos |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=ESignet_LinkedAuthorizationConsent_forOnlyEseentialClaim_Pos, endPoint=/v1/esignet/linked-authorization/v2/consent, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "linkedTransactionId": "$ID:LinkTransaction_forOnlyEseentialClaim_sid_linkTransactionId$", "acceptedClaims": [{claim: "name"},{claim: "email"}], "signature": "$CONSENTDETACHEDSIGNATUREFORONLYESSENTIAUSER1LCLAIM$" }, output={ }, inputTemplate=esignet/LinkedConsent/LinkAuthorizationConsent/LinkAuthorizationConsent, outputTemplate=esignet/LinkedAuthorizationConsent/LinkedAuthorizationConsentResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Linked authorization consent for forOnlyEseentialClaim, uniqueIdentifier=TC_ESignet_LinkedAuthorizationConsent_23, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_LinkedAuthorizationConsent_forOnlyOptionalClaimIfRequestedOptional_Pos |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=ESignet_LinkedAuthorizationConsent_forOnlyOptionalClaimIfRequestedOptional_Pos, endPoint=/v1/esignet/linked-authorization/v2/consent, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "linkedTransactionId": "$ID:LinkTransaction_forOnlyOptionalClaimIfRequestedOptional_sid_linkTransactionId$", "acceptedClaims": [], "signature": "$CONSENTDETACHEDSIGNATUREFOROPTIONALACCEPTEDUSER1CLAIM$" }, output={ }, inputTemplate=esignet/LinkedConsent/LinkAuthorizationConsent/LinkAuthorizationConsent, outputTemplate=esignet/LinkedAuthorizationConsent/LinkedAuthorizationConsentResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Linked authorization consent for optional claim if requested claim is optional, uniqueIdentifier=TC_ESignet_LinkedAuthorizationConsent_25, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_LinkedAuthorizationConsent_forPartialEseentialAndOptionalClaim |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=ESignet_LinkedAuthorizationConsent_forPartialEseentialAndOptionalClaim, endPoint=/v1/esignet/linked-authorization/v2/consent, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "linkedTransactionId": "$ID:LinkTransaction_forPartialEseentialAndOptionalClaim_sid_linkTransactionId$", "acceptedClaims": [{claim: "name"},{claim: "gender"},{claim: "picture"}], "signature": "$CONSENTDETACHEDSIGNATUREFORPARTIALESSENTIALOPTIONALUSER1CLAIM$" }, output={ "errors": [ { "errorCode": "invalid_accepted_claim" } ] }, inputTemplate=esignet/LinkedConsent/LinkAuthorizationConsent/LinkAuthorizationConsent, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Linked authorization consent for PartialEseentialAndOptionalClaim, uniqueIdentifier=TC_ESignet_LinkedAuthorizationConsent_22, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_LinkedAuthorizationConsent_withOnlyOptionalClaim_IfEssAndOptAsRequestedClaim |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=ESignet_LinkedAuthorizationConsent_withOnlyOptionalClaim_IfEssAndOptAsRequestedClaim, endPoint=/v1/esignet/linked-authorization/v2/consent, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "linkedTransactionId": "$ID:LinkTransaction_withOnlyOptionalClaim_IfEssAndOptAsRequestedClaim_sid_linkTransactionId$", "acceptedClaims": [{claim: "picture"},{claim: "gender"}], "signature": "$CONSENTDETACHEDSIGNATUREFOROPTIONALUSER1CLAIM$" }, output={ "errors": [ { "errorCode": "invalid_accepted_claim" } ] }, inputTemplate=esignet/LinkedConsent/LinkAuthorizationConsent/LinkAuthorizationConsent, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Linked authorization consent with withOnlyOptionalClaim IfEssAndOptAsRequestedClaim, uniqueIdentifier=TC_ESignet_LinkedAuthorizationConsent_21, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_LinkAuthorizationCode_Consent_Vid_SameClaim_all_Valid_Smoke_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_LinkAuthorizationCode_Consent_Vid_SameClaim_all_Valid_Smoke_sid, endPoint=/v1/esignet/linked-authorization/link-auth-code, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_LinkAuth_Consent_SameClaim_Vid_Valid_Smoke_sid_transactionId$", "linkedCode": "$ID:GenerateLinkCode_Consent_Vid_SameClaim_all_Valid_Smoke_sid_linkCode$" }, output={ }, inputTemplate=esignet/LinkAuthorizationCode/LinkAuthorizationCode, outputTemplate=esignet/LinkAuthorizationCode/LinkAuthorizationCodeResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Link Authorization code consent VID with same claim and all valid details, uniqueIdentifier=TC_ESignet_LinkAuthorizationCode_02, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:101)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_LinkAuthorizationCode_Consent_Vid_User2_all_Valid_Smoke_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_LinkAuthorizationCode_Consent_Vid_User2_all_Valid_Smoke_sid, endPoint=/v1/esignet/linked-authorization/link-auth-code, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_LinkAuth_Consent_User2_Vid_Valid_Smoke_sid_transactionId$", "linkedCode": "$ID:GenerateLinkCode_Consent_Vid_User2_all_Valid_Smoke_sid_linkCode$" }, output={ }, inputTemplate=esignet/LinkAuthorizationCode/LinkAuthorizationCode, outputTemplate=esignet/LinkAuthorizationCode/LinkAuthorizationCodeResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Link Authorization code consent VID for User2 with all valid details, uniqueIdentifier=TC_ESignet_LinkAuthorizationCode_04, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:101)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_LinkAuthorizationCode_Vid_all_Valid_Smoke_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_LinkAuthorizationCode_Vid_all_Valid_Smoke_sid, endPoint=/v1/esignet/linked-authorization/link-auth-code, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_LinkAuth_Vid_Valid_Smoke_sid_transactionId$", "linkedCode": "$ID:GenerateLinkCode_Vid_all_Valid_Smoke_sid_linkCode$" }, output={ }, inputTemplate=esignet/LinkAuthorizationCode/LinkAuthorizationCode, outputTemplate=esignet/LinkAuthorizationCode/LinkAuthorizationCodeResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Link Authorization code with all valid details VID, uniqueIdentifier=TC_ESignet_LinkAuthorizationCode_06, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:101)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_LinkAuthorizationCode_Consent_uin_SameClaim_all_Valid_Smoke_sid |
| Testcase Dependency |
| [TC_ESignet_OAuthDetailsRequestLinked_05, TC_ESignet_CreateOIDCClient_01, TC_ESignet_GenerateLinkCode_05] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_LinkAuthorizationCode_Consent_uin_SameClaim_all_Valid_Smoke_sid, endPoint=/v1/esignet/linked-authorization/link-auth-code, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_LinkAuth_Consent_SameClaim_Uin_Valid_Smoke_sid_transactionId$", "linkedCode": "$ID:GenerateLinkCode_Consent_uin_SameClaim_all_Valid_Smoke_sid_linkCode$" }, output={ }, inputTemplate=esignet/LinkAuthorizationCode/LinkAuthorizationCode, outputTemplate=esignet/LinkAuthorizationCode/LinkAuthorizationCodeResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Link Authorization code consent UIN with same claim and all valid details, uniqueIdentifier=TC_ESignet_LinkAuthorizationCode_01, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_LinkAuthorizationCode_Consent_uin_User2_all_Valid_Smoke_sid |
| Testcase Dependency |
| [TC_ESignet_OAuthDetailsRequestLinked_03, ESignet_CreateOIDCClient_Misp_Valid_Smoke_sid, TC_ESignet_GenerateLinkCode_03] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_LinkAuthorizationCode_Consent_uin_User2_all_Valid_Smoke_sid, endPoint=/v1/esignet/linked-authorization/link-auth-code, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_LinkAuth_Consent_User2_Uin_Valid_Smoke_sid_transactionId$", "linkedCode": "$ID:GenerateLinkCode_Consent_uin_User2_all_Valid_Smoke_sid_linkCode$" }, output={ }, inputTemplate=esignet/LinkAuthorizationCode/LinkAuthorizationCode, outputTemplate=esignet/LinkAuthorizationCode/LinkAuthorizationCodeResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Link Authorization code consent UIN for User2 with all valid details, uniqueIdentifier=TC_ESignet_LinkAuthorizationCode_03, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_LinkAuthorizationCode_Empty_TransactionId_Neg |
| Testcase Dependency |
| [TC_ESignet_GenerateLinkCode_01, TC_ESignet_OAuthDetailsRequestLinked_01, TC_ESignet_CreateOIDCClient_01] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_LinkAuthorizationCode_Empty_TransactionId_Neg, endPoint=/v1/esignet/linked-authorization/link-auth-code, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "transactionId": "", "linkedCode": "$ID:GenerateLinkCode_all_Valid_Smoke_sid_linkCode$" }, output={ "errors": [ { "errorCode": "invalid_transaction_id" } ] }, inputTemplate=esignet/LinkAuthorizationCode/LinkAuthorizationCode, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Link Authorization code with empty value in transactionId, uniqueIdentifier=TC_ESignet_LinkAuthorizationCode_15, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_LinkAuthorizationCode_Empty_Val_linkedCode_Neg |
| Testcase Dependency |
| [TC_ESignet_OAuthDetailsRequestLinked_01, TC_ESignet_CreateOIDCClient_01] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_LinkAuthorizationCode_Empty_Val_linkedCode_Neg, endPoint=/v1/esignet/linked-authorization/link-auth-code, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_LinkAuth_Valid_Smoke_sid_transactionId$", "linkedCode": "" }, output={ "errors": [ { "errorCode": "invalid_link_code" } ] }, inputTemplate=esignet/LinkAuthorizationCode/LinkAuthorizationCode, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Link Authorization code with empty value in linkedCode, uniqueIdentifier=TC_ESignet_LinkAuthorizationCode_19, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_LinkAuthorizationCode_Empty_Val_requestTime_Neg |
| Testcase Dependency |
| [TC_ESignet_GenerateLinkCode_01, TC_ESignet_OAuthDetailsRequestLinked_01, TC_ESignet_CreateOIDCClient_01] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_LinkAuthorizationCode_Empty_Val_requestTime_Neg, endPoint=/v1/esignet/linked-authorization/link-auth-code, role=resident, templateFields=null, input={ "requestTime": "", "transactionId": "$ID:OAuthDetailsRequest_LinkAuth_Valid_Smoke_sid_transactionId$", "linkedCode": "$ID:GenerateLinkCode_all_Valid_Smoke_sid_linkCode$" }, output={ "errors": [ { "errorCode": "invalid_request" } ] }, inputTemplate=esignet/LinkAuthorizationCode/LinkAuthorizationCode, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Link Authorization code with empty value in requestTime, uniqueIdentifier=TC_ESignet_LinkAuthorizationCode_10, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_LinkAuthorizationCode_Future_Val_requestTime_Neg |
| Testcase Dependency |
| [TC_ESignet_GenerateLinkCode_01, TC_ESignet_OAuthDetailsRequestLinked_01, TC_ESignet_CreateOIDCClient_01] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_LinkAuthorizationCode_Future_Val_requestTime_Neg, endPoint=/v1/esignet/linked-authorization/link-auth-code, role=resident, templateFields=null, input={ "requestTime": "2024-01-16T00:17:54.649Z", "transactionId": "$ID:OAuthDetailsRequest_LinkAuth_Valid_Smoke_sid_transactionId$", "linkedCode": "$ID:GenerateLinkCode_all_Valid_Smoke_sid_linkCode$" }, output={ "errors": [ { "errorCode": "invalid_request" } ] }, inputTemplate=esignet/LinkAuthorizationCode/LinkAuthorizationCode, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Link Authorization code with future value requestTime, uniqueIdentifier=TC_ESignet_LinkAuthorizationCode_09, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_LinkAuthorizationCode_Invalid_TransactionId_Neg |
| Testcase Dependency |
| [TC_ESignet_GenerateLinkCode_01, TC_ESignet_OAuthDetailsRequestLinked_01, TC_ESignet_CreateOIDCClient_01] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_LinkAuthorizationCode_Invalid_TransactionId_Neg, endPoint=/v1/esignet/linked-authorization/link-auth-code, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "transactionId": "$t21!", "linkedCode": "$ID:GenerateLinkCode_all_Valid_Smoke_sid_linkCode$" }, output={ "errors": [ { "errorCode": "invalid_link_code" } ] }, inputTemplate=esignet/LinkAuthorizationCode/LinkAuthorizationCode, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Link Authorization code with invalid transactionId, uniqueIdentifier=TC_ESignet_LinkAuthorizationCode_12, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_LinkAuthorizationCode_Invalid_linkedCode_Neg |
| Testcase Dependency |
| [TC_ESignet_OAuthDetailsRequestLinked_01, TC_ESignet_CreateOIDCClient_01] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_LinkAuthorizationCode_Invalid_linkedCode_Neg, endPoint=/v1/esignet/linked-authorization/link-auth-code, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_LinkAuth_Valid_Smoke_sid_transactionId$", "linkedCode": "$13hj" }, output={ "errors": [ { "errorCode": "invalid_link_code" } ] }, inputTemplate=esignet/LinkAuthorizationCode/LinkAuthorizationCode, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Link Authorization code with invalid linkedCode, uniqueIdentifier=TC_ESignet_LinkAuthorizationCode_16, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_LinkAuthorizationCode_Invalid_requestTime_Neg |
| Testcase Dependency |
| [TC_ESignet_GenerateLinkCode_01, TC_ESignet_OAuthDetailsRequestLinked_01, TC_ESignet_CreateOIDCClient_01] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_LinkAuthorizationCode_Invalid_requestTime_Neg, endPoint=/v1/esignet/linked-authorization/link-auth-code, role=resident, templateFields=null, input={ "requestTime": "2022-11-08T06:35:53", "transactionId": "$ID:OAuthDetailsRequest_LinkAuth_Valid_Smoke_sid_transactionId$", "linkedCode": "$ID:GenerateLinkCode_all_Valid_Smoke_sid_linkCode$" }, output={ "errors": [ { "errorCode": "invalid_request" } ] }, inputTemplate=esignet/LinkAuthorizationCode/LinkAuthorizationCode, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Link Authorization code with invalid requestTime, uniqueIdentifier=TC_ESignet_LinkAuthorizationCode_07, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_LinkAuthorizationCode_Missing_Val_TransactionId_Neg |
| Testcase Dependency |
| [TC_ESignet_GenerateLinkCode_01, TC_ESignet_OAuthDetailsRequestLinked_01, TC_ESignet_CreateOIDCClient_01] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_LinkAuthorizationCode_Missing_Val_TransactionId_Neg, endPoint=/v1/esignet/linked-authorization/link-auth-code, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "transactionId": "$REMOVE$", "linkedCode": "$ID:GenerateLinkCode_all_Valid_Smoke_sid_linkCode$" }, output={ "errors": [ { "errorCode": "invalid_transaction_id" } ] }, inputTemplate=esignet/LinkAuthorizationCode/LinkAuthorizationCode, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Link Authorization code without transactionId, uniqueIdentifier=TC_ESignet_LinkAuthorizationCode_14, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_LinkAuthorizationCode_Misssing_linkedCode_Neg |
| Testcase Dependency |
| [TC_ESignet_OAuthDetailsRequestLinked_01, TC_ESignet_CreateOIDCClient_01] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_LinkAuthorizationCode_Misssing_linkedCode_Neg, endPoint=/v1/esignet/linked-authorization/link-auth-code, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_LinkAuth_Valid_Smoke_sid_transactionId$", "linkedCode": "$REMOVE$" }, output={ "errors": [ { "errorCode": "invalid_link_code" } ] }, inputTemplate=esignet/LinkAuthorizationCode/LinkAuthorizationCode, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Link Authorization code without linkedCode, uniqueIdentifier=TC_ESignet_LinkAuthorizationCode_17, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_LinkAuthorizationCode_Past_Val_requestTime_Neg |
| Testcase Dependency |
| [TC_ESignet_GenerateLinkCode_01, TC_ESignet_OAuthDetailsRequestLinked_01, TC_ESignet_CreateOIDCClient_01] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_LinkAuthorizationCode_Past_Val_requestTime_Neg, endPoint=/v1/esignet/linked-authorization/link-auth-code, role=resident, templateFields=null, input={ "requestTime": "2023-01-16T00:17:54.649Z", "transactionId": "$ID:OAuthDetailsRequest_LinkAuth_Valid_Smoke_sid_transactionId$", "linkedCode": "$ID:GenerateLinkCode_all_Valid_Smoke_sid_linkCode$" }, output={ "errors": [ { "errorCode": "invalid_request" } ] }, inputTemplate=esignet/LinkAuthorizationCode/LinkAuthorizationCode, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Link Authorization code with past value in requestTime, uniqueIdentifier=TC_ESignet_LinkAuthorizationCode_08, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_LinkAuthorizationCode_Space_Val_TransactionId_Neg |
| Testcase Dependency |
| [TC_ESignet_GenerateLinkCode_01, TC_ESignet_OAuthDetailsRequestLinked_01, TC_ESignet_CreateOIDCClient_01] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_LinkAuthorizationCode_Space_Val_TransactionId_Neg, endPoint=/v1/esignet/linked-authorization/link-auth-code, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "transactionId": " ", "linkedCode": "$ID:GenerateLinkCode_all_Valid_Smoke_sid_linkCode$" }, output={ "errors": [ { "errorCode": "invalid_transaction_id" } ] }, inputTemplate=esignet/LinkAuthorizationCode/LinkAuthorizationCode, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Link Authorization code with only space in transactionId, uniqueIdentifier=TC_ESignet_LinkAuthorizationCode_13, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_LinkAuthorizationCode_Space_Val_linkedCode_Neg |
| Testcase Dependency |
| [TC_ESignet_OAuthDetailsRequestLinked_01, TC_ESignet_CreateOIDCClient_01] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_LinkAuthorizationCode_Space_Val_linkedCode_Neg, endPoint=/v1/esignet/linked-authorization/link-auth-code, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_LinkAuth_Valid_Smoke_sid_transactionId$", "linkedCode": " " }, output={ "errors": [ { "errorCode": "invalid_link_code" } ] }, inputTemplate=esignet/LinkAuthorizationCode/LinkAuthorizationCode, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Link Authorization code with only space in linkedCode, uniqueIdentifier=TC_ESignet_LinkAuthorizationCode_18, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_LinkAuthorizationCode_Space_Val_requestTime_Neg |
| Testcase Dependency |
| [TC_ESignet_GenerateLinkCode_01, TC_ESignet_OAuthDetailsRequestLinked_01, TC_ESignet_CreateOIDCClient_01] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_LinkAuthorizationCode_Space_Val_requestTime_Neg, endPoint=/v1/esignet/linked-authorization/link-auth-code, role=resident, templateFields=null, input={ "requestTime": " ", "transactionId": "$ID:OAuthDetailsRequest_LinkAuth_Valid_Smoke_sid_transactionId$", "linkedCode": "$ID:GenerateLinkCode_all_Valid_Smoke_sid_linkCode$" }, output={ "errors": [ { "errorCode": "invalid_request" } ] }, inputTemplate=esignet/LinkAuthorizationCode/LinkAuthorizationCode, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Link Authorization code with only space in requestTime, uniqueIdentifier=TC_ESignet_LinkAuthorizationCode_11, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_LinkAuthorizationCode_all_Valid_Smoke_sid |
| Testcase Dependency |
| [TC_ESignet_GenerateLinkCode_01, TC_ESignet_OAuthDetailsRequestLinked_01, TC_ESignet_CreateOIDCClient_01] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_LinkAuthorizationCode_all_Valid_Smoke_sid, endPoint=/v1/esignet/linked-authorization/link-auth-code, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_LinkAuth_Valid_Smoke_sid_transactionId$", "linkedCode": "$ID:GenerateLinkCode_all_Valid_Smoke_sid_linkCode$" }, output={ }, inputTemplate=esignet/LinkAuthorizationCode/LinkAuthorizationCode, outputTemplate=esignet/LinkAuthorizationCode/LinkAuthorizationCodeResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Link Authorization code with all valid details, uniqueIdentifier=TC_ESignet_LinkAuthorizationCode_05, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_GenerateToken_Linked_Vid_SameClaim_all_Valid_Smoke_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenIdForUrlEncoded |
| Testcase Input |
| testCaseName=ESignet_GenerateToken_Linked_Vid_SameClaim_all_Valid_Smoke_sid, endPoint=$GETENDPOINTFROMWELLKNOWN$, role=resident, templateFields=null, input={ "grant_type": "authorization_code", "code": "$ID:LinkAuthorizationCode_Consent_Vid_SameClaim_all_Valid_Smoke_sid_code$", "client_id": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "client_assertion_type": "urn:ietf:params:oauth:client-assertion-type:jwt-bearer", "client_assertion": "$CLIENT_ASSERTION_JWK$", "redirect_uri": "$IDPREDIRECTURI$" }, output={ "token_type": "Bearer" }, inputTemplate=esignet/Consent/GenerateTokenConsent/GenerateTokenConsent, outputTemplate=esignet/Consent/GenerateTokenConsent/GenerateTokenConsentResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generate token linked VID with same claim and all valid details, uniqueIdentifier=TC_ESignet_GenerateTokenLinked_04, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenIdForUrlEncoded.test(SimplePostForAutoGenIdForUrlEncoded.java:102)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_GenerateToken_Linked_Vid_User2_all_Valid_Smoke_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenIdForUrlEncoded |
| Testcase Input |
| testCaseName=ESignet_GenerateToken_Linked_Vid_User2_all_Valid_Smoke_sid, endPoint=$GETENDPOINTFROMWELLKNOWN$, role=resident, templateFields=null, input={ "grant_type": "authorization_code", "code": "$ID:LinkAuthorizationCode_Consent_Vid_User2_all_Valid_Smoke_sid_code$", "client_id": "$ID:CreateOIDCClient_Misp_Valid_Smoke_sid_clientId$", "client_assertion_type": "urn:ietf:params:oauth:client-assertion-type:jwt-bearer", "client_assertion": "$CLIENT_ASSERTION_USER3_JWK$", "redirect_uri": "$IDPREDIRECTURI$" }, output={ "token_type": "Bearer" }, inputTemplate=esignet/Consent/GenerateTokenConsent/GenerateTokenConsent, outputTemplate=esignet/Consent/GenerateTokenConsent/GenerateTokenConsentResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generate token linked VID for User2 with all valid details, uniqueIdentifier=TC_ESignet_GenerateTokenLinked_06, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenIdForUrlEncoded.test(SimplePostForAutoGenIdForUrlEncoded.java:102)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_GenerateToken_Linked_Vid_Valid_Smoke_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenIdForUrlEncoded |
| Testcase Input |
| testCaseName=ESignet_GenerateToken_Linked_Vid_Valid_Smoke_sid, endPoint=$GETENDPOINTFROMWELLKNOWN$, role=resident, templateFields=null, input={ "grant_type": "authorization_code", "code": "$ID:LinkAuthorizationCode_Vid_all_Valid_Smoke_sid_code$", "client_id": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "client_assertion_type": "urn:ietf:params:oauth:client-assertion-type:jwt-bearer", "client_assertion": "$CLIENT_ASSERTION_JWK$", "redirect_uri": "$IDPREDIRECTURI$" }, output={ "token_type": "Bearer" }, inputTemplate=esignet/Consent/GenerateTokenConsent/GenerateTokenConsent, outputTemplate=esignet/Consent/GenerateTokenConsent/GenerateTokenConsentResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generate token linked VID with all valid details, uniqueIdentifier=TC_ESignet_GenerateTokenLinked_02, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenIdForUrlEncoded.test(SimplePostForAutoGenIdForUrlEncoded.java:102)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_GenerateToken_Linked_uin_SameClaim_all_Valid_Smoke_sid |
| Testcase Dependency |
| [TC_ESignet_CreateOIDCClient_01, TC_ESignet_LinkAuthorizationCode_01, TC_ESignet_OAuthDetailsRequestLinked_05, TC_ESignet_GenerateLinkCode_05] |
| Class Name |
| SimplePostForAutoGenIdForUrlEncoded |
| Testcase Input |
| testCaseName=ESignet_GenerateToken_Linked_uin_SameClaim_all_Valid_Smoke_sid, endPoint=$GETENDPOINTFROMWELLKNOWN$, role=resident, templateFields=null, input={ "grant_type": "authorization_code", "code": "$ID:LinkAuthorizationCode_Consent_uin_SameClaim_all_Valid_Smoke_sid_code$", "client_id": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "client_assertion_type": "urn:ietf:params:oauth:client-assertion-type:jwt-bearer", "client_assertion": "$CLIENT_ASSERTION_JWK$", "redirect_uri": "$IDPREDIRECTURI$" }, output={ "token_type": "Bearer" }, inputTemplate=esignet/Consent/GenerateTokenConsent/GenerateTokenConsent, outputTemplate=esignet/Consent/GenerateTokenConsent/GenerateTokenConsentResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generate token linked UIN with same claim and all valid details, uniqueIdentifier=TC_ESignet_GenerateTokenLinked_03, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_GenerateToken_Linked_uin_User2_all_Valid_Smoke_sid |
| Testcase Dependency |
| [TC_ESignet_LinkAuthorizationCode_03, TC_ESignet_OAuthDetailsRequestLinked_03, ESignet_CreateOIDCClient_Misp_Valid_Smoke_sid, TC_ESignet_GenerateLinkCode_03] |
| Class Name |
| SimplePostForAutoGenIdForUrlEncoded |
| Testcase Input |
| testCaseName=ESignet_GenerateToken_Linked_uin_User2_all_Valid_Smoke_sid, endPoint=$GETENDPOINTFROMWELLKNOWN$, role=resident, templateFields=null, input={ "grant_type": "authorization_code", "code": "$ID:LinkAuthorizationCode_Consent_uin_User2_all_Valid_Smoke_sid_code$", "client_id": "$ID:CreateOIDCClient_Misp_Valid_Smoke_sid_clientId$", "client_assertion_type": "urn:ietf:params:oauth:client-assertion-type:jwt-bearer", "client_assertion": "$CLIENT_ASSERTION_USER3_JWK$", "redirect_uri": "$IDPREDIRECTURI$" }, output={ "token_type": "Bearer" }, inputTemplate=esignet/Consent/GenerateTokenConsent/GenerateTokenConsent, outputTemplate=esignet/Consent/GenerateTokenConsent/GenerateTokenConsentResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generate token linked UIN for User2 with all valid details, uniqueIdentifier=TC_ESignet_GenerateTokenLinked_05, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_GenerateToken_Linked_uin_Valid_Smoke_sid |
| Testcase Dependency |
| [TC_ESignet_CreateOIDCClient_01, TC_ESignet_LinkAuthorizationCode_05, TC_ESignet_GenerateLinkCode_01, TC_ESignet_OAuthDetailsRequestLinked_01] |
| Class Name |
| SimplePostForAutoGenIdForUrlEncoded |
| Testcase Input |
| testCaseName=ESignet_GenerateToken_Linked_uin_Valid_Smoke_sid, endPoint=$GETENDPOINTFROMWELLKNOWN$, role=resident, templateFields=null, input={ "grant_type": "authorization_code", "code": "$ID:LinkAuthorizationCode_all_Valid_Smoke_sid_code$", "client_id": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "client_assertion_type": "urn:ietf:params:oauth:client-assertion-type:jwt-bearer", "client_assertion": "$CLIENT_ASSERTION_JWK$", "redirect_uri": "$IDPREDIRECTURI$" }, output={ "token_type": "Bearer" }, inputTemplate=esignet/Consent/GenerateTokenConsent/GenerateTokenConsent, outputTemplate=esignet/Consent/GenerateTokenConsent/GenerateTokenConsentResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generate token linked UIN with all valid details, uniqueIdentifier=TC_ESignet_GenerateTokenLinked_01, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_GetOidcUserInfo_Linked_Vid_IdpAccessToken_StatusCode_SameClaim_Valid_Smoke_sid |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=ESignet_GetOidcUserInfo_Linked_Vid_IdpAccessToken_StatusCode_SameClaim_Valid_Smoke_sid, endPoint=/v1/esignet/oidc/userinfo, role=resident, templateFields=null, input={ "idpAccessToken": "$ID:GenerateToken_Linked_Vid_SameClaim_all_Valid_Smoke_sid_access_token$" }, output=200, inputTemplate=esignet/Consent/GetOidcUserInfoConsent/GetOidcUserInfoConsent, outputTemplate=esignet/Consent/GetOidcUserInfoConsent/GetOidcUserInfoConsentResult, restMethod=get, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Get OIDC user info linked VID with same claim and all valid details, uniqueIdentifier=TC_ESignet_GetOidcUserInfoLinked_04, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.GetWithParam.test(GetWithParam.java:96)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_GetOidcUserInfo_Linked_Vid_IdpAccessToken_StatusCode_User2_Valid_Smoke_sid |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=ESignet_GetOidcUserInfo_Linked_Vid_IdpAccessToken_StatusCode_User2_Valid_Smoke_sid, endPoint=/v1/esignet/oidc/userinfo, role=resident, templateFields=null, input={ "idpAccessToken": "$ID:GenerateToken_Linked_Vid_User2_all_Valid_Smoke_sid_access_token$" }, output=200, inputTemplate=esignet/Consent/GetOidcUserInfoConsent/GetOidcUserInfoConsent, outputTemplate=esignet/Consent/GetOidcUserInfoConsent/GetOidcUserInfoConsentResult, restMethod=get, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Get OIDC user info linked VID for user2 with all valid details, uniqueIdentifier=TC_ESignet_GetOidcUserInfoLinked_06, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.GetWithParam.test(GetWithParam.java:96)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_GetOidcUserInfo_Linked_Vid_IdpAccessToken_StatusCode_Valid_Smoke_sid |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=ESignet_GetOidcUserInfo_Linked_Vid_IdpAccessToken_StatusCode_Valid_Smoke_sid, endPoint=/v1/esignet/oidc/userinfo, role=resident, templateFields=null, input={ "idpAccessToken": "$ID:GenerateToken_Linked_Vid_Valid_Smoke_sid_access_token$" }, output=200, inputTemplate=esignet/Consent/GetOidcUserInfoConsent/GetOidcUserInfoConsent, outputTemplate=esignet/Consent/GetOidcUserInfoConsent/GetOidcUserInfoConsentResult, restMethod=get, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Get OIDC user info linked VID with all valid details, uniqueIdentifier=TC_ESignet_GetOidcUserInfoLinked_02, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.GetWithParam.test(GetWithParam.java:96)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_GetOidcUserInfo_Linked_uin_IdpAccessToken_StatusCode_SameClaim_Valid_Smoke_sid |
| Testcase Dependency |
| [TC_ESignet_GenerateTokenLinked_03, TC_ESignet_CreateOIDCClient_01, TC_ESignet_LinkAuthorizationCode_01, TC_ESignet_OAuthDetailsRequestLinked_05, TC_ESignet_GenerateLinkCode_05] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=ESignet_GetOidcUserInfo_Linked_uin_IdpAccessToken_StatusCode_SameClaim_Valid_Smoke_sid, endPoint=/v1/esignet/oidc/userinfo, role=resident, templateFields=null, input={ "idpAccessToken": "$ID:GenerateToken_Linked_uin_SameClaim_all_Valid_Smoke_sid_access_token$" }, output=200, inputTemplate=esignet/Consent/GetOidcUserInfoConsent/GetOidcUserInfoConsent, outputTemplate=esignet/Consent/GetOidcUserInfoConsent/GetOidcUserInfoConsentResult, restMethod=get, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Get OIDC user info linked UIN with same claim and all valid details, uniqueIdentifier=TC_ESignet_GetOidcUserInfoLinked_03, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_GetOidcUserInfo_Linked_uin_IdpAccessToken_StatusCode_User2_Valid_Smoke_sid |
| Testcase Dependency |
| [TC_ESignet_GenerateTokenLinked_05, TC_ESignet_LinkAuthorizationCode_03, TC_ESignet_OAuthDetailsRequestLinked_03, ESignet_CreateOIDCClient_Misp_Valid_Smoke_sid, TC_ESignet_GenerateLinkCode_03] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=ESignet_GetOidcUserInfo_Linked_uin_IdpAccessToken_StatusCode_User2_Valid_Smoke_sid, endPoint=/v1/esignet/oidc/userinfo, role=resident, templateFields=null, input={ "idpAccessToken": "$ID:GenerateToken_Linked_uin_User2_all_Valid_Smoke_sid_access_token$" }, output=200, inputTemplate=esignet/Consent/GetOidcUserInfoConsent/GetOidcUserInfoConsent, outputTemplate=esignet/Consent/GetOidcUserInfoConsent/GetOidcUserInfoConsentResult, restMethod=get, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Get OIDC user info linked UIN for user2 with all valid details, uniqueIdentifier=TC_ESignet_GetOidcUserInfoLinked_05, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_GetOidcUserInfo_Linked_uin_IdpAccessToken_StatusCode_Valid_Smoke_sid |
| Testcase Dependency |
| [TC_ESignet_GenerateTokenLinked_01, TC_ESignet_CreateOIDCClient_01, TC_ESignet_LinkAuthorizationCode_05, TC_ESignet_GenerateLinkCode_01, TC_ESignet_OAuthDetailsRequestLinked_01] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=ESignet_GetOidcUserInfo_Linked_uin_IdpAccessToken_StatusCode_Valid_Smoke_sid, endPoint=/v1/esignet/oidc/userinfo, role=resident, templateFields=null, input={ "idpAccessToken": "$ID:GenerateToken_Linked_uin_Valid_Smoke_sid_access_token$" }, output=200, inputTemplate=esignet/Consent/GetOidcUserInfoConsent/GetOidcUserInfoConsent, outputTemplate=esignet/Consent/GetOidcUserInfoConsent/GetOidcUserInfoConsentResult, restMethod=get, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Get OIDC user info linked UIN with all valid details, uniqueIdentifier=TC_ESignet_GetOidcUserInfoLinked_01, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_OAuthDetailsRequest_NonAuth_BioFace_Vid_all_Valid_Smoke_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_OAuthDetailsRequest_NonAuth_BioFace_Vid_all_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_NonAuth_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:biometrics", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en" }, output={ }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Oauthdetails request with NonAuth BioFace and all valid details VID, uniqueIdentifier=TC_ESignet_OAuthDetailsRequestNonAuth_04, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:101)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_OAuthDetailsRequest_NonAuth_LeftIris_Vid_all_Valid_Smoke_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_OAuthDetailsRequest_NonAuth_LeftIris_Vid_all_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_NonAuth_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:biometrics", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en" }, output={ }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Oauthdetails request with NonAuth LeftIris and all valid details VID, uniqueIdentifier=TC_ESignet_OAuthDetailsRequestNonAuth_26, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:101)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_OAuthDetailsRequest_NonAuth_LeftLittleFinger_Vid_all_Valid_Smoke_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_OAuthDetailsRequest_NonAuth_LeftLittleFinger_Vid_all_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_NonAuth_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:biometrics", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en" }, output={ }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Oauthdetails request with NonAuth LeftLittleFinger and all valid details VID, uniqueIdentifier=TC_ESignet_OAuthDetailsRequestNonAuth_10, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:101)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_OAuthDetailsRequest_NonAuth_LeftMiddleFingerr_Vid_all_Valid_Smoke_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_OAuthDetailsRequest_NonAuth_LeftMiddleFingerr_Vid_all_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_NonAuth_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:biometrics", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en" }, output={ }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Oauthdetails request with NonAuth LeftMiddleFinger and all valid details VID, uniqueIdentifier=TC_ESignet_OAuthDetailsRequestNonAuth_08, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:101)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_OAuthDetailsRequest_NonAuth_LeftThumb_Vid_all_Valid_Smoke_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_OAuthDetailsRequest_NonAuth_LeftThumb_Vid_all_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_NonAuth_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:biometrics", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en" }, output={ }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Oauthdetails request with NonAuth LeftThumb and all valid details VID, uniqueIdentifier=TC_ESignet_OAuthDetailsRequestNonAuth_20, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:101)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_OAuthDetailsRequest_NonAuth_Otp_Vid_all_Valid_Smoke_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_OAuthDetailsRequest_NonAuth_Otp_Vid_all_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_NonAuth_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:generated-code", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en" }, output={ }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Oauthdetails request with NonAuth Otp and all valid details VID, uniqueIdentifier=TC_ESignet_OAuthDetailsRequestNonAuth_02, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:101)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_OAuthDetailsRequest_NonAuth_RightIndexFinger_Vid_all_Valid_Smoke_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_OAuthDetailsRequest_NonAuth_RightIndexFinger_Vid_all_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_NonAuth_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:biometrics", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en" }, output={ }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Oauthdetails request with NonAuth RightIndexFinger and all valid details VID, uniqueIdentifier=TC_ESignet_OAuthDetailsRequestNonAuth_12, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:101)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_OAuthDetailsRequest_NonAuth_RightIris_Vid_all_Valid_Smoke_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_OAuthDetailsRequest_NonAuth_RightIris_Vid_all_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_NonAuth_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:biometrics", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en" }, output={ }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Oauthdetails request with NonAuth RightIris and all valid details VID, uniqueIdentifier=TC_ESignet_OAuthDetailsRequestNonAuth_24, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:101)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_OAuthDetailsRequest_NonAuth_RightLittleFinger_Vid_all_Valid_Smoke_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_OAuthDetailsRequest_NonAuth_RightLittleFinger_Vid_all_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_NonAuth_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:biometrics", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en" }, output={ }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Oauthdetails request with NonAuth RightLittleFinger and all valid details VID, uniqueIdentifier=TC_ESignet_OAuthDetailsRequestNonAuth_18, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:101)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_OAuthDetailsRequest_NonAuth_RightMiddleFinger_Vid_all_Valid_Smoke_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_OAuthDetailsRequest_NonAuth_RightMiddleFinger_Vid_all_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_NonAuth_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:biometrics", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en" }, output={ }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Oauthdetails request with NonAuth RightMiddleFinger and all valid details VID, uniqueIdentifier=TC_ESignet_OAuthDetailsRequestNonAuth_16, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:101)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_OAuthDetailsRequest_NonAuth_RightRingFinger_Vid_all_Valid_Smoke_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_OAuthDetailsRequest_NonAuth_RightRingFinger_Vid_all_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_NonAuth_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:biometrics", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en" }, output={ }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Oauthdetails request with NonAuth RightRingFinger and all valid details VID, uniqueIdentifier=TC_ESignet_OAuthDetailsRequestNonAuth_14, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:101)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_OAuthDetailsRequest_NonAuth_RightThumb_Vid_all_Valid_Smoke_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_OAuthDetailsRequest_NonAuth_RightThumb_Vid_all_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_NonAuth_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:biometrics", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en" }, output={ }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Oauthdetails request with NonAuth RightThumb and all valid details VID, uniqueIdentifier=TC_ESignet_OAuthDetailsRequestNonAuth_22, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:101)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_OAuthDetailsRequest_NonAuth_RingFinger_Vid_all_Valid_Smoke_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_OAuthDetailsRequest_NonAuth_RingFinger_Vid_all_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_NonAuth_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:biometrics", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en" }, output={ }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Oauthdetails request with NonAuth RingFinger and all valid details VID, uniqueIdentifier=TC_ESignet_OAuthDetailsRequestNonAuth_06, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:101)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_OAuthDetailsRequest_NonAuth_BioFace_all_Valid_Smoke_sid |
| Testcase Dependency |
| [ESignet_CreateOIDCClient_NonAuth_all_Valid_Smoke_sid] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_OAuthDetailsRequest_NonAuth_BioFace_all_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_NonAuth_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:biometrics", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en" }, output={ }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Oauthdetails request with NonAuth BioFace and all valid details, uniqueIdentifier=TC_ESignet_OAuthDetailsRequestNonAuth_03, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_OAuthDetailsRequest_NonAuth_LeftIris_all_Valid_Smoke_sid |
| Testcase Dependency |
| [ESignet_CreateOIDCClient_NonAuth_all_Valid_Smoke_sid] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_OAuthDetailsRequest_NonAuth_LeftIris_all_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_NonAuth_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:biometrics", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en" }, output={ }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Oauthdetails request with NonAuth LeftIris and all valid details, uniqueIdentifier=TC_ESignet_OAuthDetailsRequestNonAuth_25, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_OAuthDetailsRequest_NonAuth_LeftLittleFinger_all_Valid_Smoke_sid |
| Testcase Dependency |
| [ESignet_CreateOIDCClient_NonAuth_all_Valid_Smoke_sid] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_OAuthDetailsRequest_NonAuth_LeftLittleFinger_all_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_NonAuth_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:biometrics", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en" }, output={ }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Oauthdetails request with NonAuth LeftLittleFinger and all valid details, uniqueIdentifier=TC_ESignet_OAuthDetailsRequestNonAuth_09, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_OAuthDetailsRequest_NonAuth_LeftMiddleFingerr_all_Valid_Smoke_sid |
| Testcase Dependency |
| [ESignet_CreateOIDCClient_NonAuth_all_Valid_Smoke_sid] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_OAuthDetailsRequest_NonAuth_LeftMiddleFingerr_all_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_NonAuth_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:biometrics", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en" }, output={ }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Oauthdetails request with NonAuth LeftMiddleFinger and all valid details, uniqueIdentifier=TC_ESignet_OAuthDetailsRequestNonAuth_07, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_OAuthDetailsRequest_NonAuth_LeftThumb_all_Valid_Smoke_sid |
| Testcase Dependency |
| [ESignet_CreateOIDCClient_NonAuth_all_Valid_Smoke_sid] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_OAuthDetailsRequest_NonAuth_LeftThumb_all_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_NonAuth_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:biometrics", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en" }, output={ }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Oauthdetails request with NonAuth LeftThumb and all valid details, uniqueIdentifier=TC_ESignet_OAuthDetailsRequestNonAuth_19, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_OAuthDetailsRequest_NonAuth_Otp_all_Valid_Smoke_sid |
| Testcase Dependency |
| [ESignet_CreateOIDCClient_NonAuth_all_Valid_Smoke_sid] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_OAuthDetailsRequest_NonAuth_Otp_all_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_NonAuth_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:generated-code", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en" }, output={ }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Oauthdetails request with NonAuth Otp and all valid details, uniqueIdentifier=TC_ESignet_OAuthDetailsRequestNonAuth_01, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_OAuthDetailsRequest_NonAuth_RightIndexFinger_all_Valid_Smoke_sid |
| Testcase Dependency |
| [ESignet_CreateOIDCClient_NonAuth_all_Valid_Smoke_sid] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_OAuthDetailsRequest_NonAuth_RightIndexFinger_all_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_NonAuth_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:biometrics", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en" }, output={ }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Oauthdetails request with NonAuth RightIndexFinger and all valid details, uniqueIdentifier=TC_ESignet_OAuthDetailsRequestNonAuth_11, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_OAuthDetailsRequest_NonAuth_RightIris_all_Valid_Smoke_sid |
| Testcase Dependency |
| [ESignet_CreateOIDCClient_NonAuth_all_Valid_Smoke_sid] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_OAuthDetailsRequest_NonAuth_RightIris_all_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_NonAuth_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:biometrics", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en" }, output={ }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Oauthdetails request with NonAuth RightIris and all valid details, uniqueIdentifier=TC_ESignet_OAuthDetailsRequestNonAuth_23, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_OAuthDetailsRequest_NonAuth_RightLittleFinger_all_Valid_Smoke_sid |
| Testcase Dependency |
| [ESignet_CreateOIDCClient_NonAuth_all_Valid_Smoke_sid] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_OAuthDetailsRequest_NonAuth_RightLittleFinger_all_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_NonAuth_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:biometrics", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en" }, output={ }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Oauthdetails request with NonAuth RightLittleFinger and all valid details, uniqueIdentifier=TC_ESignet_OAuthDetailsRequestNonAuth_17, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_OAuthDetailsRequest_NonAuth_RightMiddleFinger_all_Valid_Smoke_sid |
| Testcase Dependency |
| [ESignet_CreateOIDCClient_NonAuth_all_Valid_Smoke_sid] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_OAuthDetailsRequest_NonAuth_RightMiddleFinger_all_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_NonAuth_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:biometrics", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en" }, output={ }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Oauthdetails request with NonAuth RightMiddleFinger and all valid details, uniqueIdentifier=TC_ESignet_OAuthDetailsRequestNonAuth_15, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_OAuthDetailsRequest_NonAuth_RightRingFinger_all_Valid_Smoke_sid |
| Testcase Dependency |
| [ESignet_CreateOIDCClient_NonAuth_all_Valid_Smoke_sid] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_OAuthDetailsRequest_NonAuth_RightRingFinger_all_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_NonAuth_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:biometrics", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en" }, output={ }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Oauthdetails request with NonAuth RightRingFinger and all valid details, uniqueIdentifier=TC_ESignet_OAuthDetailsRequestNonAuth_13, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_OAuthDetailsRequest_NonAuth_RightThumb_all_Valid_Smoke_sid |
| Testcase Dependency |
| [ESignet_CreateOIDCClient_NonAuth_all_Valid_Smoke_sid] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_OAuthDetailsRequest_NonAuth_RightThumb_all_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_NonAuth_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:biometrics", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en" }, output={ }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Oauthdetails request with NonAuth RightThumb and all valid details, uniqueIdentifier=TC_ESignet_OAuthDetailsRequestNonAuth_21, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_OAuthDetailsRequest_NonAuth_RingFinger_all_Valid_Smoke_sid |
| Testcase Dependency |
| [ESignet_CreateOIDCClient_NonAuth_all_Valid_Smoke_sid] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_OAuthDetailsRequest_NonAuth_RingFinger_all_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_NonAuth_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:biometrics", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en" }, output={ }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Oauthdetails request with NonAuth RingFinger and all valid details, uniqueIdentifier=TC_ESignet_OAuthDetailsRequestNonAuth_05, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_BioAuth_Biometric_Face_NonAuth_With_Valid_uin_Smoke_Pos |
| Testcase Dependency |
| [] |
| Class Name |
| EsignetBioAuth |
| Testcase Input |
| testCaseName=ESignet_BioAuth_Biometric_Face_NonAuth_With_Valid_uin_Smoke_Pos, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_NonAuth_BioFace_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_NonAuth_BioFace_all_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_BioAuth_smoke_Pos_UIN$", "authFactorType" : "BIO", "challenge" : "$CHALLENGE$", "identityRequest":{ "bioSubType": "UNKNOWN", "bioType": "FACE", "bioValue": "$FACE$", "deviceCode": "bc0b6848-6d45-46d1-a9bd-b334410bf823", "dateTime": "$DATETIME$", "deviceProviderID": "1873299273", "deviceServiceID": "", "deviceServiceVersion": "SB.WIN.001", "deviceProvider": "SYNCBYTE", "deviceProviderId": "SYNCBYTE.LTC165", "deviceSubType": "Full face", "make": "Logitech", "model": "4d36e96c-e325-11ce-bfc1-08002be10318", "serialNo": "78467171", "type": "Face", "transactionId": "$TRANSACTIONID$", "identityRequestTemplate": "esignet/BioAuthIdp/BioAuthIdentityEncrypt", "identityRequestEncUrl": "/idauthentication/v1/internal/encrypt" } }, output={ "errors": [ { "errorCode": "auth_factor_mismatch" } ] }, inputTemplate=esignet/BioAuthIdp/bioAuth, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Face biometric with NonAuth and valid details UIN, uniqueIdentifier=TC_ESignet_BioNonAuth_01, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:210)
at io.mosip.testrig.apirig.esignet.testscripts.EsignetBioAuth.test(EsignetBioAuth.java:90)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_BioAuth_Biometric_LeftIris_With_Vid_NonAuth_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| EsignetBioAuth |
| Testcase Input |
| testCaseName=ESignet_BioAuth_Biometric_LeftIris_With_Vid_NonAuth_Neg, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_NonAuth_LeftIris_Vid_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_NonAuth_LeftIris_Vid_all_Valid_Smoke_sid_transactionId$", "individualId": "$ID:Generate_Perpetual2_VID_Valid_Smoke_sid_vid$", "authFactorType" : "BIO", "challenge" : "$CHALLENGE$", "identityRequest":{ "bioSubType": "Left", "bioType": "Iris", "bioValue": "$LEFTIRIS$", "deviceCode": "bc0b6848-6d45-46d1-a9bd-b334410bf823", "dateTime": "$DATETIME$", "deviceProviderID": "SYNCBYTE.MC01A", "deviceServiceID": "", "deviceServiceVersion": "SB.WIN.001", "deviceProvider": "SYNCBYTE", "deviceProviderId": "SYNCBYTE.LTC165", "deviceSubType": "Slap", "make": "Logitech", "model": "4d36e96c-e325-11ce-bfc1-08002be10318", "serialNo": "78467175", "type": "Iris", "transactionId": "$TRANSACTIONID$", "identityRequestTemplate": "esignet/BioAuthIdp/BioAuthIdentityEncrypt", "identityRequestEncUrl": "/idauthentication/v1/internal/encrypt" } }, output={ "errors": [ { "errorCode": "auth_factor_mismatch" } ] }, inputTemplate=esignet/BioAuthIdp/bioAuth, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=LeftIris biometric with NonAuth VID, uniqueIdentifier=TC_ESignet_BioNonAuth_24, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:210)
at io.mosip.testrig.apirig.esignet.testscripts.EsignetBioAuth.test(EsignetBioAuth.java:90)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_BioAuth_Biometric_LeftIris_With_uin_NonAuth_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| EsignetBioAuth |
| Testcase Input |
| testCaseName=ESignet_BioAuth_Biometric_LeftIris_With_uin_NonAuth_Neg, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_NonAuth_LeftIris_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_NonAuth_LeftIris_all_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_BioAuth_smoke_Pos_UIN$", "authFactorType" : "BIO", "challenge" : "$CHALLENGE$", "identityRequest":{ "bioSubType": "Left", "bioType": "Iris", "bioValue": "$LEFTIRIS$", "deviceCode": "bc0b6848-6d45-46d1-a9bd-b334410bf823", "dateTime": "$DATETIME$", "deviceProviderID": "SYNCBYTE.MC01A", "deviceServiceID": "", "deviceServiceVersion": "SB.WIN.001", "deviceProvider": "SYNCBYTE", "deviceProviderId": "SYNCBYTE.LTC165", "deviceSubType": "Slap", "make": "Logitech", "model": "4d36e96c-e325-11ce-bfc1-08002be10318", "serialNo": "78467175", "type": "Iris", "transactionId": "$TRANSACTIONID$", "identityRequestTemplate": "esignet/BioAuthIdp/BioAuthIdentityEncrypt", "identityRequestEncUrl": "/idauthentication/v1/internal/encrypt" } }, output={ "errors": [ { "errorCode": "auth_factor_mismatch" } ] }, inputTemplate=esignet/BioAuthIdp/bioAuth, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=LeftIris biometric with NonAuth UIN, uniqueIdentifier=TC_ESignet_BioNonAuth_12, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:210)
at io.mosip.testrig.apirig.esignet.testscripts.EsignetBioAuth.test(EsignetBioAuth.java:90)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_BioAuth_Biometric_LeftLittleFinger_With_Vid_NonAuth_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| EsignetBioAuth |
| Testcase Input |
| testCaseName=ESignet_BioAuth_Biometric_LeftLittleFinger_With_Vid_NonAuth_Neg, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_NonAuth_LeftLittleFinger_Vid_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_NonAuth_LeftLittleFinger_Vid_all_Valid_Smoke_sid_transactionId$", "individualId": "$ID:Generate_Perpetual2_VID_Valid_Smoke_sid_vid$", "authFactorType" : "BIO", "challenge" : "$CHALLENGE$", "identityRequest":{ "bioSubType": "Left LittleFinger", "bioType": "Finger", "bioValue": "$LEFTLITTLEFINGER$", "deviceCode": "bc0b6848-6d45-46d1-a9bd-b334410bf823", "dateTime": "$DATETIME$", "deviceProviderID": "SYNCBYTE.MC01A", "deviceServiceID": "", "deviceServiceVersion": "SB.WIN.001", "deviceProvider": "SYNCBYTE", "deviceProviderId": "SYNCBYTE.LTC165", "deviceSubType": "Slap", "make": "Logitech", "model": "4d36e96c-e325-11ce-bfc1-08002be10318", "serialNo": "78467175", "type": "Finger", "transactionId": "$TRANSACTIONID$", "identityRequestTemplate": "esignet/BioAuthIdp/BioAuthIdentityEncrypt", "identityRequestEncUrl": "/idauthentication/v1/internal/encrypt" } }, output={ "errors": [ { "errorCode": "auth_factor_mismatch" } ] }, inputTemplate=esignet/BioAuthIdp/bioAuth, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=LeftLittleFinger biometric with NonAuth VID, uniqueIdentifier=TC_ESignet_BioNonAuth_16, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:210)
at io.mosip.testrig.apirig.esignet.testscripts.EsignetBioAuth.test(EsignetBioAuth.java:90)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_BioAuth_Biometric_LeftLittleFinger_With_uin_NonAuth_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| EsignetBioAuth |
| Testcase Input |
| testCaseName=ESignet_BioAuth_Biometric_LeftLittleFinger_With_uin_NonAuth_Neg, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_NonAuth_LeftLittleFinger_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_NonAuth_LeftLittleFinger_all_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_BioAuth_smoke_Pos_UIN$", "authFactorType" : "BIO", "challenge" : "$CHALLENGE$", "identityRequest":{ "bioSubType": "Left LittleFinger", "bioType": "Finger", "bioValue": "$LEFTLITTLEFINGER$", "deviceCode": "bc0b6848-6d45-46d1-a9bd-b334410bf823", "dateTime": "$DATETIME$", "deviceProviderID": "SYNCBYTE.MC01A", "deviceServiceID": "", "deviceServiceVersion": "SB.WIN.001", "deviceProvider": "SYNCBYTE", "deviceProviderId": "SYNCBYTE.LTC165", "deviceSubType": "Slap", "make": "Logitech", "model": "4d36e96c-e325-11ce-bfc1-08002be10318", "serialNo": "78467175", "type": "Finger", "transactionId": "$TRANSACTIONID$", "identityRequestTemplate": "esignet/BioAuthIdp/BioAuthIdentityEncrypt", "identityRequestEncUrl": "/idauthentication/v1/internal/encrypt" } }, output={ "errors": [ { "errorCode": "auth_factor_mismatch" } ] }, inputTemplate=esignet/BioAuthIdp/bioAuth, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=LeftLittleFinger biometric with NonAuth UIN, uniqueIdentifier=TC_ESignet_BioNonAuth_04, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:210)
at io.mosip.testrig.apirig.esignet.testscripts.EsignetBioAuth.test(EsignetBioAuth.java:90)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_BioAuth_Biometric_LeftMiddleFingerr_With_Vid_NonAuth_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| EsignetBioAuth |
| Testcase Input |
| testCaseName=ESignet_BioAuth_Biometric_LeftMiddleFingerr_With_Vid_NonAuth_Neg, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_NonAuth_LeftMiddleFingerr_Vid_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_NonAuth_LeftMiddleFingerr_Vid_all_Valid_Smoke_sid_transactionId$", "individualId": "$ID:Generate_Perpetual2_VID_Valid_Smoke_sid_vid$", "authFactorType" : "BIO", "challenge" : "$CHALLENGE$", "identityRequest":{ "bioSubType": "Left MiddleFinger", "bioType": "Finger", "bioValue": "$LEFTMIDDLEFINGER$", "deviceCode": "bc0b6848-6d45-46d1-a9bd-b334410bf823", "dateTime": "$DATETIME$", "deviceProviderID": "SYNCBYTE.MC01A", "deviceServiceID": "", "deviceServiceVersion": "SB.WIN.001", "deviceProvider": "SYNCBYTE", "deviceProviderId": "SYNCBYTE.LTC165", "deviceSubType": "Slap", "make": "Logitech", "model": "4d36e96c-e325-11ce-bfc1-08002be10318", "serialNo": "78467175", "type": "Finger", "transactionId": "$TRANSACTIONID$", "identityRequestTemplate": "esignet/BioAuthIdp/BioAuthIdentityEncrypt", "identityRequestEncUrl": "/idauthentication/v1/internal/encrypt" } }, output={ "errors": [ { "errorCode": "auth_factor_mismatch" } ] }, inputTemplate=esignet/BioAuthIdp/bioAuth, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=LeftMiddleFinger biometric with NonAuth VID, uniqueIdentifier=TC_ESignet_BioNonAuth_15, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:210)
at io.mosip.testrig.apirig.esignet.testscripts.EsignetBioAuth.test(EsignetBioAuth.java:90)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_BioAuth_Biometric_LeftMiddleFingerr_With_uin_NonAuth_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| EsignetBioAuth |
| Testcase Input |
| testCaseName=ESignet_BioAuth_Biometric_LeftMiddleFingerr_With_uin_NonAuth_Neg, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_NonAuth_LeftMiddleFingerr_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_NonAuth_LeftMiddleFingerr_all_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_BioAuth_smoke_Pos_UIN$", "authFactorType" : "BIO", "challenge" : "$CHALLENGE$", "identityRequest":{ "bioSubType": "Left MiddleFinger", "bioType": "Finger", "bioValue": "$LEFTMIDDLEFINGER$", "deviceCode": "bc0b6848-6d45-46d1-a9bd-b334410bf823", "dateTime": "$DATETIME$", "deviceProviderID": "SYNCBYTE.MC01A", "deviceServiceID": "", "deviceServiceVersion": "SB.WIN.001", "deviceProvider": "SYNCBYTE", "deviceProviderId": "SYNCBYTE.LTC165", "deviceSubType": "Slap", "make": "Logitech", "model": "4d36e96c-e325-11ce-bfc1-08002be10318", "serialNo": "78467175", "type": "Finger", "transactionId": "$TRANSACTIONID$", "identityRequestTemplate": "esignet/BioAuthIdp/BioAuthIdentityEncrypt", "identityRequestEncUrl": "/idauthentication/v1/internal/encrypt" } }, output={ "errors": [ { "errorCode": "auth_factor_mismatch" } ] }, inputTemplate=esignet/BioAuthIdp/bioAuth, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=LeftMiddleFinger biometric with NonAuth UIN, uniqueIdentifier=TC_ESignet_BioNonAuth_03, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:210)
at io.mosip.testrig.apirig.esignet.testscripts.EsignetBioAuth.test(EsignetBioAuth.java:90)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_BioAuth_Biometric_LeftThumb_With_Vid_NonAuth_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| EsignetBioAuth |
| Testcase Input |
| testCaseName=ESignet_BioAuth_Biometric_LeftThumb_With_Vid_NonAuth_Neg, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_NonAuth_LeftThumb_Vid_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_NonAuth_LeftThumb_Vid_all_Valid_Smoke_sid_transactionId$", "individualId": "$ID:Generate_Perpetual2_VID_Valid_Smoke_sid_vid$", "authFactorType" : "BIO", "challenge" : "$CHALLENGE$", "identityRequest":{ "bioSubType": "Left Thumb", "bioType": "Finger", "bioValue": "$LEFTTHUMB$", "deviceCode": "bc0b6848-6d45-46d1-a9bd-b334410bf823", "dateTime": "$DATETIME$", "deviceProviderID": "SYNCBYTE.MC01A", "deviceServiceID": "", "deviceServiceVersion": "SB.WIN.001", "deviceProvider": "SYNCBYTE", "deviceProviderId": "SYNCBYTE.LTC165", "deviceSubType": "Slap", "make": "Logitech", "model": "4d36e96c-e325-11ce-bfc1-08002be10318", "serialNo": "78467175", "type": "Finger", "transactionId": "$TRANSACTIONID$", "identityRequestTemplate": "esignet/BioAuthIdp/BioAuthIdentityEncrypt", "identityRequestEncUrl": "/idauthentication/v1/internal/encrypt" } }, output={ "errors": [ { "errorCode": "auth_factor_mismatch" } ] }, inputTemplate=esignet/BioAuthIdp/bioAuth, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=LeftThumb biometric with NonAuth VID, uniqueIdentifier=TC_ESignet_BioNonAuth_21, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:210)
at io.mosip.testrig.apirig.esignet.testscripts.EsignetBioAuth.test(EsignetBioAuth.java:90)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_BioAuth_Biometric_LeftThumb_With_uin_NonAuth_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| EsignetBioAuth |
| Testcase Input |
| testCaseName=ESignet_BioAuth_Biometric_LeftThumb_With_uin_NonAuth_Neg, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_NonAuth_LeftThumb_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_NonAuth_LeftThumb_all_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_BioAuth_smoke_Pos_UIN$", "authFactorType" : "BIO", "challenge" : "$CHALLENGE$", "identityRequest":{ "bioSubType": "Left Thumb", "bioType": "Finger", "bioValue": "$LEFTTHUMB$", "deviceCode": "bc0b6848-6d45-46d1-a9bd-b334410bf823", "dateTime": "$DATETIME$", "deviceProviderID": "SYNCBYTE.MC01A", "deviceServiceID": "", "deviceServiceVersion": "SB.WIN.001", "deviceProvider": "SYNCBYTE", "deviceProviderId": "SYNCBYTE.LTC165", "deviceSubType": "Slap", "make": "Logitech", "model": "4d36e96c-e325-11ce-bfc1-08002be10318", "serialNo": "78467175", "type": "Finger", "transactionId": "$TRANSACTIONID$", "identityRequestTemplate": "esignet/BioAuthIdp/BioAuthIdentityEncrypt", "identityRequestEncUrl": "/idauthentication/v1/internal/encrypt" } }, output={ "errors": [ { "errorCode": "auth_factor_mismatch" } ] }, inputTemplate=esignet/BioAuthIdp/bioAuth, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=LeftThumb biometric with NonAuth UIN, uniqueIdentifier=TC_ESignet_BioNonAuth_09, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:210)
at io.mosip.testrig.apirig.esignet.testscripts.EsignetBioAuth.test(EsignetBioAuth.java:90)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_BioAuth_Biometric_RightIndexFinger_With_Vid_NonAuth_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| EsignetBioAuth |
| Testcase Input |
| testCaseName=ESignet_BioAuth_Biometric_RightIndexFinger_With_Vid_NonAuth_Neg, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_NonAuth_RightIndexFinger_Vid_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_NonAuth_RightIndexFinger_Vid_all_Valid_Smoke_sid_transactionId$", "individualId": "$ID:Generate_Perpetual2_VID_Valid_Smoke_sid_vid$", "authFactorType" : "BIO", "challenge" : "$CHALLENGE$", "identityRequest":{ "bioSubType": "Right IndexFinger", "bioType": "Finger", "bioValue": "$RIGHTINDEXFINGER$", "deviceCode": "bc0b6848-6d45-46d1-a9bd-b334410bf823", "dateTime": "$DATETIME$", "deviceProviderID": "SYNCBYTE.MC01A", "deviceServiceID": "", "deviceServiceVersion": "SB.WIN.001", "deviceProvider": "SYNCBYTE", "deviceProviderId": "SYNCBYTE.LTC165", "deviceSubType": "Slap", "make": "Logitech", "model": "4d36e96c-e325-11ce-bfc1-08002be10318", "serialNo": "78467175", "type": "Finger", "transactionId": "$TRANSACTIONID$", "identityRequestTemplate": "esignet/BioAuthIdp/BioAuthIdentityEncrypt", "identityRequestEncUrl": "/idauthentication/v1/internal/encrypt" } }, output={ "errors": [ { "errorCode": "auth_factor_mismatch" } ] }, inputTemplate=esignet/BioAuthIdp/bioAuth, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=RightIndexFinger biometric with NonAuth VID, uniqueIdentifier=TC_ESignet_BioNonAuth_17, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:210)
at io.mosip.testrig.apirig.esignet.testscripts.EsignetBioAuth.test(EsignetBioAuth.java:90)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_BioAuth_Biometric_RightIndexFinger_With_uin_NonAuth_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| EsignetBioAuth |
| Testcase Input |
| testCaseName=ESignet_BioAuth_Biometric_RightIndexFinger_With_uin_NonAuth_Neg, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_NonAuth_RightIndexFinger_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_NonAuth_RightIndexFinger_all_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_BioAuth_smoke_Pos_UIN$", "authFactorType" : "BIO", "challenge" : "$CHALLENGE$", "identityRequest":{ "bioSubType": "Right IndexFinger", "bioType": "Finger", "bioValue": "$RIGHTINDEXFINGER$", "deviceCode": "bc0b6848-6d45-46d1-a9bd-b334410bf823", "dateTime": "$DATETIME$", "deviceProviderID": "SYNCBYTE.MC01A", "deviceServiceID": "", "deviceServiceVersion": "SB.WIN.001", "deviceProvider": "SYNCBYTE", "deviceProviderId": "SYNCBYTE.LTC165", "deviceSubType": "Slap", "make": "Logitech", "model": "4d36e96c-e325-11ce-bfc1-08002be10318", "serialNo": "78467175", "type": "Finger", "transactionId": "$TRANSACTIONID$", "identityRequestTemplate": "esignet/BioAuthIdp/BioAuthIdentityEncrypt", "identityRequestEncUrl": "/idauthentication/v1/internal/encrypt" } }, output={ "errors": [ { "errorCode": "auth_factor_mismatch" } ] }, inputTemplate=esignet/BioAuthIdp/bioAuth, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=RightIndexFinger biometric with NonAuth UIN, uniqueIdentifier=TC_ESignet_BioNonAuth_05, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:210)
at io.mosip.testrig.apirig.esignet.testscripts.EsignetBioAuth.test(EsignetBioAuth.java:90)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_BioAuth_Biometric_RightIris_With_Vid_NonAuth_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| EsignetBioAuth |
| Testcase Input |
| testCaseName=ESignet_BioAuth_Biometric_RightIris_With_Vid_NonAuth_Neg, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_NonAuth_RightIris_Vid_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_NonAuth_RightIris_Vid_all_Valid_Smoke_sid_transactionId$", "individualId": "$ID:Generate_Perpetual2_VID_Valid_Smoke_sid_vid$", "authFactorType" : "BIO", "challenge" : "$CHALLENGE$", "identityRequest":{ "bioSubType": "Right", "bioType": "Iris", "bioValue": "$RIGHTIRIS$", "deviceCode": "bc0b6848-6d45-46d1-a9bd-b334410bf823", "dateTime": "$DATETIME$", "deviceProviderID": "SYNCBYTE.MC01A", "deviceServiceID": "", "deviceServiceVersion": "SB.WIN.001", "deviceProvider": "SYNCBYTE", "deviceProviderId": "SYNCBYTE.LTC165", "deviceSubType": "Slap", "make": "Logitech", "model": "4d36e96c-e325-11ce-bfc1-08002be10318", "serialNo": "78467175", "type": "Iris", "transactionId": "$TRANSACTIONID$", "identityRequestTemplate": "esignet/BioAuthIdp/BioAuthIdentityEncrypt", "identityRequestEncUrl": "/idauthentication/v1/internal/encrypt" } }, output={ "errors": [ { "errorCode": "auth_factor_mismatch" } ] }, inputTemplate=esignet/BioAuthIdp/bioAuth, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=RightIris biometric with NonAuth VID, uniqueIdentifier=TC_ESignet_BioNonAuth_23, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:210)
at io.mosip.testrig.apirig.esignet.testscripts.EsignetBioAuth.test(EsignetBioAuth.java:90)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_BioAuth_Biometric_RightIris_With_uin_NonAuth_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| EsignetBioAuth |
| Testcase Input |
| testCaseName=ESignet_BioAuth_Biometric_RightIris_With_uin_NonAuth_Neg, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_NonAuth_RightIris_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_NonAuth_RightIris_all_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_BioAuth_smoke_Pos_UIN$", "authFactorType" : "BIO", "challenge" : "$CHALLENGE$", "identityRequest":{ "bioSubType": "Right", "bioType": "Iris", "bioValue": "$RIGHTIRIS$", "deviceCode": "bc0b6848-6d45-46d1-a9bd-b334410bf823", "dateTime": "$DATETIME$", "deviceProviderID": "SYNCBYTE.MC01A", "deviceServiceID": "", "deviceServiceVersion": "SB.WIN.001", "deviceProvider": "SYNCBYTE", "deviceProviderId": "SYNCBYTE.LTC165", "deviceSubType": "Slap", "make": "Logitech", "model": "4d36e96c-e325-11ce-bfc1-08002be10318", "serialNo": "78467175", "type": "Iris", "transactionId": "$TRANSACTIONID$", "identityRequestTemplate": "esignet/BioAuthIdp/BioAuthIdentityEncrypt", "identityRequestEncUrl": "/idauthentication/v1/internal/encrypt" } }, output={ "errors": [ { "errorCode": "auth_factor_mismatch" } ] }, inputTemplate=esignet/BioAuthIdp/bioAuth, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=RightIris biometric with NonAuth UIN, uniqueIdentifier=TC_ESignet_BioNonAuth_11, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:210)
at io.mosip.testrig.apirig.esignet.testscripts.EsignetBioAuth.test(EsignetBioAuth.java:90)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_BioAuth_Biometric_RightLittleFinger_With_Vid_NonAuth_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| EsignetBioAuth |
| Testcase Input |
| testCaseName=ESignet_BioAuth_Biometric_RightLittleFinger_With_Vid_NonAuth_Neg, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_NonAuth_RightLittleFinger_Vid_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_NonAuth_RightLittleFinger_Vid_all_Valid_Smoke_sid_transactionId$", "individualId": "$ID:Generate_Perpetual2_VID_Valid_Smoke_sid_vid$", "authFactorType" : "BIO", "challenge" : "$CHALLENGE$", "identityRequest":{ "bioSubType": "Right LittleFinger", "bioType": "Finger", "bioValue": "$RIGHTLITTLEFINGER$", "deviceCode": "bc0b6848-6d45-46d1-a9bd-b334410bf823", "dateTime": "$DATETIME$", "deviceProviderID": "SYNCBYTE.MC01A", "deviceServiceID": "", "deviceServiceVersion": "SB.WIN.001", "deviceProvider": "SYNCBYTE", "deviceProviderId": "SYNCBYTE.LTC165", "deviceSubType": "Slap", "make": "Logitech", "model": "4d36e96c-e325-11ce-bfc1-08002be10318", "serialNo": "78467175", "type": "Finger", "transactionId": "$TRANSACTIONID$", "identityRequestTemplate": "esignet/BioAuthIdp/BioAuthIdentityEncrypt", "identityRequestEncUrl": "/idauthentication/v1/internal/encrypt" } }, output={ "errors": [ { "errorCode": "auth_factor_mismatch" } ] }, inputTemplate=esignet/BioAuthIdp/bioAuth, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=RightLittleFinger biometric with NonAuth VID, uniqueIdentifier=TC_ESignet_BioNonAuth_20, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:210)
at io.mosip.testrig.apirig.esignet.testscripts.EsignetBioAuth.test(EsignetBioAuth.java:90)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_BioAuth_Biometric_RightLittleFinger_With_uin_NonAuth_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| EsignetBioAuth |
| Testcase Input |
| testCaseName=ESignet_BioAuth_Biometric_RightLittleFinger_With_uin_NonAuth_Neg, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_NonAuth_RightLittleFinger_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_NonAuth_RightLittleFinger_all_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_BioAuth_smoke_Pos_UIN$", "authFactorType" : "BIO", "challenge" : "$CHALLENGE$", "identityRequest":{ "bioSubType": "Right LittleFinger", "bioType": "Finger", "bioValue": "$RIGHTLITTLEFINGER$", "deviceCode": "bc0b6848-6d45-46d1-a9bd-b334410bf823", "dateTime": "$DATETIME$", "deviceProviderID": "SYNCBYTE.MC01A", "deviceServiceID": "", "deviceServiceVersion": "SB.WIN.001", "deviceProvider": "SYNCBYTE", "deviceProviderId": "SYNCBYTE.LTC165", "deviceSubType": "Slap", "make": "Logitech", "model": "4d36e96c-e325-11ce-bfc1-08002be10318", "serialNo": "78467175", "type": "Finger", "transactionId": "$TRANSACTIONID$", "identityRequestTemplate": "esignet/BioAuthIdp/BioAuthIdentityEncrypt", "identityRequestEncUrl": "/idauthentication/v1/internal/encrypt" } }, output={ "errors": [ { "errorCode": "auth_factor_mismatch" } ] }, inputTemplate=esignet/BioAuthIdp/bioAuth, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=RightLittleFinger biometric with NonAuth UIN, uniqueIdentifier=TC_ESignet_BioNonAuth_08, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:210)
at io.mosip.testrig.apirig.esignet.testscripts.EsignetBioAuth.test(EsignetBioAuth.java:90)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_BioAuth_Biometric_RightMiddleFinger_With_Vid_NonAuth_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| EsignetBioAuth |
| Testcase Input |
| testCaseName=ESignet_BioAuth_Biometric_RightMiddleFinger_With_Vid_NonAuth_Neg, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_NonAuth_RightMiddleFinger_Vid_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_NonAuth_RightMiddleFinger_Vid_all_Valid_Smoke_sid_transactionId$", "individualId": "$ID:Generate_Perpetual2_VID_Valid_Smoke_sid_vid$", "authFactorType" : "BIO", "challenge" : "$CHALLENGE$", "identityRequest":{ "bioSubType": "Right MiddleFinger", "bioType": "Finger", "bioValue": "$RIGHTMIDDLEFINGER$", "deviceCode": "bc0b6848-6d45-46d1-a9bd-b334410bf823", "dateTime": "$DATETIME$", "deviceProviderID": "SYNCBYTE.MC01A", "deviceServiceID": "", "deviceServiceVersion": "SB.WIN.001", "deviceProvider": "SYNCBYTE", "deviceProviderId": "SYNCBYTE.LTC165", "deviceSubType": "Slap", "make": "Logitech", "model": "4d36e96c-e325-11ce-bfc1-08002be10318", "serialNo": "78467175", "type": "Finger", "transactionId": "$TRANSACTIONID$", "identityRequestTemplate": "esignet/BioAuthIdp/BioAuthIdentityEncrypt", "identityRequestEncUrl": "/idauthentication/v1/internal/encrypt" } }, output={ "errors": [ { "errorCode": "auth_factor_mismatch" } ] }, inputTemplate=esignet/BioAuthIdp/bioAuth, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=RightMiddleFinger biometric with NonAuth VID, uniqueIdentifier=TC_ESignet_BioNonAuth_19, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:210)
at io.mosip.testrig.apirig.esignet.testscripts.EsignetBioAuth.test(EsignetBioAuth.java:90)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_BioAuth_Biometric_RightMiddleFinger_With_uin_NonAuth_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| EsignetBioAuth |
| Testcase Input |
| testCaseName=ESignet_BioAuth_Biometric_RightMiddleFinger_With_uin_NonAuth_Neg, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_NonAuth_RightMiddleFinger_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_NonAuth_RightMiddleFinger_all_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_BioAuth_smoke_Pos_UIN$", "authFactorType" : "BIO", "challenge" : "$CHALLENGE$", "identityRequest":{ "bioSubType": "Right MiddleFinger", "bioType": "Finger", "bioValue": "$RIGHTMIDDLEFINGER$", "deviceCode": "bc0b6848-6d45-46d1-a9bd-b334410bf823", "dateTime": "$DATETIME$", "deviceProviderID": "SYNCBYTE.MC01A", "deviceServiceID": "", "deviceServiceVersion": "SB.WIN.001", "deviceProvider": "SYNCBYTE", "deviceProviderId": "SYNCBYTE.LTC165", "deviceSubType": "Slap", "make": "Logitech", "model": "4d36e96c-e325-11ce-bfc1-08002be10318", "serialNo": "78467175", "type": "Finger", "transactionId": "$TRANSACTIONID$", "identityRequestTemplate": "esignet/BioAuthIdp/BioAuthIdentityEncrypt", "identityRequestEncUrl": "/idauthentication/v1/internal/encrypt" } }, output={ "errors": [ { "errorCode": "auth_factor_mismatch" } ] }, inputTemplate=esignet/BioAuthIdp/bioAuth, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=RightMiddleFinger biometric with NonAuth UIN, uniqueIdentifier=TC_ESignet_BioNonAuth_07, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:210)
at io.mosip.testrig.apirig.esignet.testscripts.EsignetBioAuth.test(EsignetBioAuth.java:90)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_BioAuth_Biometric_RightRingFinger_With_Vid_NonAuth_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| EsignetBioAuth |
| Testcase Input |
| testCaseName=ESignet_BioAuth_Biometric_RightRingFinger_With_Vid_NonAuth_Neg, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_NonAuth_RightRingFinger_Vid_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_NonAuth_RightRingFinger_Vid_all_Valid_Smoke_sid_transactionId$", "individualId": "$ID:Generate_Perpetual2_VID_Valid_Smoke_sid_vid$", "authFactorType" : "BIO", "challenge" : "$CHALLENGE$", "identityRequest":{ "bioSubType": "Right RingFinger", "bioType": "Finger", "bioValue": "$RIGHTRINGFINGER$", "deviceCode": "bc0b6848-6d45-46d1-a9bd-b334410bf823", "dateTime": "$DATETIME$", "deviceProviderID": "SYNCBYTE.MC01A", "deviceServiceID": "", "deviceServiceVersion": "SB.WIN.001", "deviceProvider": "SYNCBYTE", "deviceProviderId": "SYNCBYTE.LTC165", "deviceSubType": "Slap", "make": "Logitech", "model": "4d36e96c-e325-11ce-bfc1-08002be10318", "serialNo": "78467175", "type": "Finger", "transactionId": "$TRANSACTIONID$", "identityRequestTemplate": "esignet/BioAuthIdp/BioAuthIdentityEncrypt", "identityRequestEncUrl": "/idauthentication/v1/internal/encrypt" } }, output={ "errors": [ { "errorCode": "auth_factor_mismatch" } ] }, inputTemplate=esignet/BioAuthIdp/bioAuth, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=RightRingFinger biometric with NonAuth VID, uniqueIdentifier=TC_ESignet_BioNonAuth_18, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:210)
at io.mosip.testrig.apirig.esignet.testscripts.EsignetBioAuth.test(EsignetBioAuth.java:90)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_BioAuth_Biometric_RightRingFinger_With_uin_NonAuth_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| EsignetBioAuth |
| Testcase Input |
| testCaseName=ESignet_BioAuth_Biometric_RightRingFinger_With_uin_NonAuth_Neg, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_NonAuth_RightRingFinger_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_NonAuth_RightRingFinger_all_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_BioAuth_smoke_Pos_UIN$", "authFactorType" : "BIO", "challenge" : "$CHALLENGE$", "identityRequest":{ "bioSubType": "Right RingFinger", "bioType": "Finger", "bioValue": "$RIGHTRINGFINGER$", "deviceCode": "bc0b6848-6d45-46d1-a9bd-b334410bf823", "dateTime": "$DATETIME$", "deviceProviderID": "SYNCBYTE.MC01A", "deviceServiceID": "", "deviceServiceVersion": "SB.WIN.001", "deviceProvider": "SYNCBYTE", "deviceProviderId": "SYNCBYTE.LTC165", "deviceSubType": "Slap", "make": "Logitech", "model": "4d36e96c-e325-11ce-bfc1-08002be10318", "serialNo": "78467175", "type": "Finger", "transactionId": "$TRANSACTIONID$", "identityRequestTemplate": "esignet/BioAuthIdp/BioAuthIdentityEncrypt", "identityRequestEncUrl": "/idauthentication/v1/internal/encrypt" } }, output={ "errors": [ { "errorCode": "auth_factor_mismatch" } ] }, inputTemplate=esignet/BioAuthIdp/bioAuth, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=RightRingFinger biometric with NonAuth UIN, uniqueIdentifier=TC_ESignet_BioNonAuth_06, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:210)
at io.mosip.testrig.apirig.esignet.testscripts.EsignetBioAuth.test(EsignetBioAuth.java:90)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_BioAuth_Biometric_RightThumb_With_Vid_NonAuth_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| EsignetBioAuth |
| Testcase Input |
| testCaseName=ESignet_BioAuth_Biometric_RightThumb_With_Vid_NonAuth_Neg, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_NonAuth_RightThumb_Vid_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_NonAuth_RightThumb_Vid_all_Valid_Smoke_sid_transactionId$", "individualId": "$ID:Generate_Perpetual2_VID_Valid_Smoke_sid_vid$", "authFactorType" : "BIO", "challenge" : "$CHALLENGE$", "identityRequest":{ "bioSubType": "Right Thumb", "bioType": "Finger", "bioValue": "$RIGHTTHUMB$", "deviceCode": "bc0b6848-6d45-46d1-a9bd-b334410bf823", "dateTime": "$DATETIME$", "deviceProviderID": "SYNCBYTE.MC01A", "deviceServiceID": "", "deviceServiceVersion": "SB.WIN.001", "deviceProvider": "SYNCBYTE", "deviceProviderId": "SYNCBYTE.LTC165", "deviceSubType": "Slap", "make": "Logitech", "model": "4d36e96c-e325-11ce-bfc1-08002be10318", "serialNo": "78467175", "type": "Finger", "transactionId": "$TRANSACTIONID$", "identityRequestTemplate": "esignet/BioAuthIdp/BioAuthIdentityEncrypt", "identityRequestEncUrl": "/idauthentication/v1/internal/encrypt" } }, output={ "errors": [ { "errorCode": "auth_factor_mismatch" } ] }, inputTemplate=esignet/BioAuthIdp/bioAuth, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=RightThumb biometric with NonAuth VID, uniqueIdentifier=TC_ESignet_BioNonAuth_22, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:210)
at io.mosip.testrig.apirig.esignet.testscripts.EsignetBioAuth.test(EsignetBioAuth.java:90)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_BioAuth_Biometric_RightThumb_With_uin_NonAuth_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| EsignetBioAuth |
| Testcase Input |
| testCaseName=ESignet_BioAuth_Biometric_RightThumb_With_uin_NonAuth_Neg, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_NonAuth_RightThumb_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_NonAuth_RightThumb_all_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_BioAuth_smoke_Pos_UIN$", "authFactorType" : "BIO", "challenge" : "$CHALLENGE$", "identityRequest":{ "bioSubType": "Right Thumb", "bioType": "Finger", "bioValue": "$RIGHTTHUMB$", "deviceCode": "bc0b6848-6d45-46d1-a9bd-b334410bf823", "dateTime": "$DATETIME$", "deviceProviderID": "SYNCBYTE.MC01A", "deviceServiceID": "", "deviceServiceVersion": "SB.WIN.001", "deviceProvider": "SYNCBYTE", "deviceProviderId": "SYNCBYTE.LTC165", "deviceSubType": "Slap", "make": "Logitech", "model": "4d36e96c-e325-11ce-bfc1-08002be10318", "serialNo": "78467175", "type": "Finger", "transactionId": "$TRANSACTIONID$", "identityRequestTemplate": "esignet/BioAuthIdp/BioAuthIdentityEncrypt", "identityRequestEncUrl": "/idauthentication/v1/internal/encrypt" } }, output={ "errors": [ { "errorCode": "auth_factor_mismatch" } ] }, inputTemplate=esignet/BioAuthIdp/bioAuth, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=RightThumb biometric with NonAuth UIN, uniqueIdentifier=TC_ESignet_BioNonAuth_10, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:210)
at io.mosip.testrig.apirig.esignet.testscripts.EsignetBioAuth.test(EsignetBioAuth.java:90)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_BioAuth_Biometric_RingFinger_With_Vid_NonAuth_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| EsignetBioAuth |
| Testcase Input |
| testCaseName=ESignet_BioAuth_Biometric_RingFinger_With_Vid_NonAuth_Neg, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_NonAuth_RingFinger_Vid_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_NonAuth_RingFinger_Vid_all_Valid_Smoke_sid_transactionId$", "individualId": "$ID:Generate_Perpetual2_VID_Valid_Smoke_sid_vid$", "authFactorType" : "BIO", "challenge" : "$CHALLENGE$", "identityRequest":{ "bioSubType": "Left RingFinger", "bioType": "Finger", "bioValue": "$LEFTRINGFINGER$", "deviceCode": "bc0b6848-6d45-46d1-a9bd-b334410bf823", "dateTime": "$DATETIME$", "deviceProviderID": "SYNCBYTE.MC01A", "deviceServiceID": "", "deviceServiceVersion": "SB.WIN.001", "deviceProvider": "SYNCBYTE", "deviceProviderId": "SYNCBYTE.LTC165", "deviceSubType": "Slap", "make": "Logitech", "model": "4d36e96c-e325-11ce-bfc1-08002be10318", "serialNo": "78467175", "type": "Finger", "transactionId": "$TRANSACTIONID$", "identityRequestTemplate": "esignet/BioAuthIdp/BioAuthIdentityEncrypt", "identityRequestEncUrl": "/idauthentication/v1/internal/encrypt" } }, output={ "errors": [ { "errorCode": "auth_factor_mismatch" } ] }, inputTemplate=esignet/BioAuthIdp/bioAuth, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=RingFinger biometric with NonAuth VID, uniqueIdentifier=TC_ESignet_BioNonAuth_14, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:210)
at io.mosip.testrig.apirig.esignet.testscripts.EsignetBioAuth.test(EsignetBioAuth.java:90)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_BioAuth_Biometric_RingFinger_With_uin_NonAuth_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| EsignetBioAuth |
| Testcase Input |
| testCaseName=ESignet_BioAuth_Biometric_RingFinger_With_uin_NonAuth_Neg, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_NonAuth_RingFinger_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_NonAuth_RingFinger_all_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_BioAuth_smoke_Pos_UIN$", "authFactorType" : "BIO", "challenge" : "$CHALLENGE$", "identityRequest":{ "bioSubType": "Left RingFinger", "bioType": "Finger", "bioValue": "$LEFTRINGFINGER$", "deviceCode": "bc0b6848-6d45-46d1-a9bd-b334410bf823", "dateTime": "$DATETIME$", "deviceProviderID": "SYNCBYTE.MC01A", "deviceServiceID": "", "deviceServiceVersion": "SB.WIN.001", "deviceProvider": "SYNCBYTE", "deviceProviderId": "SYNCBYTE.LTC165", "deviceSubType": "Slap", "make": "Logitech", "model": "4d36e96c-e325-11ce-bfc1-08002be10318", "serialNo": "78467175", "type": "Finger", "transactionId": "$TRANSACTIONID$", "identityRequestTemplate": "esignet/BioAuthIdp/BioAuthIdentityEncrypt", "identityRequestEncUrl": "/idauthentication/v1/internal/encrypt" } }, output={ "errors": [ { "errorCode": "auth_factor_mismatch" } ] }, inputTemplate=esignet/BioAuthIdp/bioAuth, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=RingFinger biometric with NonAuth UIN, uniqueIdentifier=TC_ESignet_BioNonAuth_02, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:210)
at io.mosip.testrig.apirig.esignet.testscripts.EsignetBioAuth.test(EsignetBioAuth.java:90)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_BioNonAuth_Biometric_Face_NonAuth_With_Valid_Vid_Smoke_Pos |
| Testcase Dependency |
| [] |
| Class Name |
| EsignetBioAuth |
| Testcase Input |
| testCaseName=ESignet_BioNonAuth_Biometric_Face_NonAuth_With_Valid_Vid_Smoke_Pos, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_NonAuth_BioFace_Vid_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_NonAuth_BioFace_Vid_all_Valid_Smoke_sid_transactionId$", "individualId": "$ID:Generate_Perpetual2_VID_Valid_Smoke_sid_vid$", "authFactorType" : "BIO", "challenge" : "$CHALLENGE$", "identityRequest":{ "bioSubType": "UNKNOWN", "bioType": "FACE", "bioValue": "$FACE$", "deviceCode": "bc0b6848-6d45-46d1-a9bd-b334410bf823", "dateTime": "$DATETIME$", "deviceProviderID": "1873299273", "deviceServiceID": "", "deviceServiceVersion": "SB.WIN.001", "deviceProvider": "SYNCBYTE", "deviceProviderId": "SYNCBYTE.LTC165", "deviceSubType": "Full face", "make": "Logitech", "model": "4d36e96c-e325-11ce-bfc1-08002be10318", "serialNo": "78467171", "type": "Face", "transactionId": "$TRANSACTIONID$", "identityRequestTemplate": "esignet/BioAuthIdp/BioAuthIdentityEncrypt", "identityRequestEncUrl": "/idauthentication/v1/internal/encrypt" } }, output={ "errors": [ { "errorCode": "auth_factor_mismatch" } ] }, inputTemplate=esignet/BioAuthIdp/bioAuth, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Face biometric with NonAuth and valid details VID, uniqueIdentifier=TC_ESignet_BioNonAuth_13, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.EsignetBioAuth.test(EsignetBioAuth.java:107)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_AuthenticateUserIDP_NonAuth_Otp_Vid_Valid_Smoke |
| Testcase Dependency |
| [] |
| Class Name |
| PostWithAutogenIdWithOtpGenerate |
| Testcase Input |
| testCaseName=ESignet_AuthenticateUserIDP_NonAuth_Otp_Vid_Valid_Smoke, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_NonAuth_Otp_Vid_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_NonAuth_Otp_Vid_all_Valid_Smoke_sid_transactionId$", "individualId": "$ID:Generate_Perpetual_VID_Valid_Smoke_sid_vid$", "authFactorType" : "OTP", "challenge" : "$ID:AddIdentity_Vid_Generation_smoke_Pos_EMAIL$", "sendOtp":{ "encodedHash": "$ID:OAuthDetailsRequest_NonAuth_Otp_Vid_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_NonAuth_Otp_Vid_all_Valid_Smoke_sid_transactionId$", "individualId": "$ID:Generate_Perpetual_VID_Valid_Smoke_sid_vid$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendOtp/SendOtp", "sendOtpEndPoint": "/v1/esignet/authorization/send-otp" } }, output={ "errors": [ { "errorCode": "auth_factor_mismatch", "errorMessage": "auth_factor_mismatch" } ], "sendOtpResp":{ "sendOtpResTemplate":"esignet/SendOtp/SendOtpResult" } }, inputTemplate=esignet/AuthenticateUser/AuthenticateUser, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Authenticate User with NonAuth Otp with valid details VID, uniqueIdentifier=TC_ESignet_AuthenticateUserNonAuth_02, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.PostWithAutogenIdWithOtpGenerate.test(PostWithAutogenIdWithOtpGenerate.java:98)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_AuthenticateUserIDP_NonAuth_uin_Otp_Valid_Smoke |
| Testcase Dependency |
| [] |
| Class Name |
| PostWithAutogenIdWithOtpGenerate |
| Testcase Input |
| testCaseName=ESignet_AuthenticateUserIDP_NonAuth_uin_Otp_Valid_Smoke, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_NonAuth_Otp_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_NonAuth_Otp_all_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_Valid_Parameters_smoke_Pos_UIN$", "authFactorType" : "OTP", "challenge" : "$ID:AddIdentity_Valid_Parameters_smoke_Pos_EMAIL$", "sendOtp":{ "encodedHash": "$ID:OAuthDetailsRequest_NonAuth_Otp_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_NonAuth_Otp_all_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_Valid_Parameters_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendOtp/SendOtp", "sendOtpEndPoint": "/v1/esignet/authorization/send-otp" } }, output={ "errors": [ { "errorCode": "auth_factor_mismatch", "errorMessage": "auth_factor_mismatch" } ], "sendOtpResp":{ "sendOtpResTemplate":"esignet/SendOtp/SendOtpResult" } }, inputTemplate=esignet/AuthenticateUser/AuthenticateUser, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Authenticate User with NonAuth Otp with valid details UIN, uniqueIdentifier=TC_ESignet_AuthenticateUserNonAuth_01, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:210)
at io.mosip.testrig.apirig.esignet.testscripts.PostWithAutogenIdWithOtpGenerate.test(PostWithAutogenIdWithOtpGenerate.java:89)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_OAuthDetailsRequest_Consent_Vid_Claim2_all_Valid_Smoke_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_OAuthDetailsRequest_Consent_Vid_Claim2_all_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:generated-code", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en" }, output={ }, inputTemplate=esignet/Consent/OAuthDetailsRequestConsent/OAuthDetailsRequestConsentNewClaim, outputTemplate=esignet/Consent/OAuthDetailsRequestConsent/OAuthDetailsRequestConsentResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Oauthdetails request for consent with claim2 and all valid details VID, uniqueIdentifier=null, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:101)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_OAuthDetailsRequest_Consent_Vid_User2_all_Valid_Smoke_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_OAuthDetailsRequest_Consent_Vid_User2_all_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_Misp_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:generated-code", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en" }, output={ }, inputTemplate=esignet/Consent/OAuthDetailsRequestConsent/OAuthDetailsRequestConsent, outputTemplate=esignet/Consent/OAuthDetailsRequestConsent/OAuthDetailsRequestConsentResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Oauthdetails request for user2 with all valid details VID, uniqueIdentifier=null, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:101)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_OAuthDetailsRequest_Consent_Vid_all_Valid_Smoke_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_OAuthDetailsRequest_Consent_Vid_all_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:generated-code", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en" }, output={ }, inputTemplate=esignet/Consent/OAuthDetailsRequestConsent/OAuthDetailsRequestConsent, outputTemplate=esignet/Consent/OAuthDetailsRequestConsent/OAuthDetailsRequestConsentResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Oauthdetails request for consent with all valid details VID, uniqueIdentifier=null, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:101)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_OAuthDetailsRequest_Consent_Claim2_all_Valid_Smoke_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_OAuthDetailsRequest_Consent_Claim2_all_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:generated-code", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en" }, output={ }, inputTemplate=esignet/Consent/OAuthDetailsRequestConsent/OAuthDetailsRequestConsentNewClaim, outputTemplate=esignet/Consent/OAuthDetailsRequestConsent/OAuthDetailsRequestConsentResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Oauthdetails request for consent with claim2 and all valid details, uniqueIdentifier=null, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_OAuthDetailsRequest_Consent_Invalid_Scen_Smoke_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_OAuthDetailsRequest_Consent_Invalid_Scen_Smoke_sid, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:generated-code", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en" }, output={ }, inputTemplate=esignet/Consent/OAuthDetailsRequestConsent/OAuthDetailsRequestConsent, outputTemplate=esignet/Consent/OAuthDetailsRequestConsent/OAuthDetailsRequestConsentResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Oauthdetails request for consent with invalid scen, uniqueIdentifier=null, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_OAuthDetailsRequest_Consent_User2_all_Valid_Smoke_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_OAuthDetailsRequest_Consent_User2_all_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_Misp_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:generated-code", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en" }, output={ }, inputTemplate=esignet/Consent/OAuthDetailsRequestConsent/OAuthDetailsRequestConsent, outputTemplate=esignet/Consent/OAuthDetailsRequestConsent/OAuthDetailsRequestConsentResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Oauthdetails request for user2 with all valid details, uniqueIdentifier=null, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_OAuthDetailsRequest_Consent_all_Valid_Smoke_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_OAuthDetailsRequest_Consent_all_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:generated-code", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en" }, output={ }, inputTemplate=esignet/Consent/OAuthDetailsRequestConsent/OAuthDetailsRequestConsent, outputTemplate=esignet/Consent/OAuthDetailsRequestConsent/OAuthDetailsRequestConsentResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Oauthdetails request for consent with all valid details, uniqueIdentifier=null, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_OAuthDetailsRequest_Consent_all_Valid_authCodeNeg_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_OAuthDetailsRequest_Consent_all_Valid_authCodeNeg_sid, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:generated-code", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en" }, output={ }, inputTemplate=esignet/Consent/OAuthDetailsRequestConsent/OAuthDetailsRequestConsent, outputTemplate=esignet/Consent/OAuthDetailsRequestConsent/OAuthDetailsRequestConsentResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Oauthdetails request for consent with all valid details, uniqueIdentifier=null, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_OAuthDetailsRequest_Consent_all_withOnly_OptionalClaim_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_OAuthDetailsRequest_Consent_all_withOnly_OptionalClaim_sid, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:generated-code", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en" }, output={ }, inputTemplate=esignet/Consent/OAuthDetailsRequestConsent/OAuthDetailsRequestConsentOptionalClaim, outputTemplate=esignet/Consent/OAuthDetailsRequestConsent/OAuthDetailsRequestConsentResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Oauthdetails request for consent with all valid details, uniqueIdentifier=null, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_OAuthDetailsRequest_Consent_all_withOnly_OptionalClaim_user2_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_OAuthDetailsRequest_Consent_all_withOnly_OptionalClaim_user2_sid, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:generated-code", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en" }, output={ }, inputTemplate=esignet/Consent/OAuthDetailsRequestConsent/OAuthDetailsRequestConsentOptionalClaim, outputTemplate=esignet/Consent/OAuthDetailsRequestConsent/OAuthDetailsRequestConsentResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Oauthdetails request for consent with all valid details, uniqueIdentifier=null, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_AuthenticateUserIDP_Consent_Vid_Otp_Claim2_Valid_Smoke |
| Testcase Dependency |
| [] |
| Class Name |
| PostWithAutogenIdWithOtpGenerate |
| Testcase Input |
| testCaseName=ESignet_AuthenticateUserIDP_Consent_Vid_Otp_Claim2_Valid_Smoke, endPoint=/v1/esignet/authorization/v2/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_Consent_Vid_Claim2_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_Consent_Vid_Claim2_all_Valid_Smoke_sid_transactionId$", "individualId": "$ID:Generate_Perpetual_VID_Consent_Valid_Smoke_sid_vid$", "authFactorType" : "OTP", "challenge" : "$ID:AddIdentity_Consent_Vid_smoke_Pos_EMAIL$", "sendOtp":{ "encodedHash": "$ID:OAuthDetailsRequest_Consent_Vid_Claim2_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_Consent_Vid_Claim2_all_Valid_Smoke_sid_transactionId$", "individualId": "$ID:Generate_Perpetual_VID_Consent_Valid_Smoke_sid_vid$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendOtp/SendOtp", "sendOtpEndPoint": "/v1/esignet/authorization/send-otp" } }, output={ "consentAction": "CAPTURE", "sendOtpResp":{ "sendOtpResTemplate":"esignet/SendOtp/SendOtpResult" } }, inputTemplate=esignet/Consent/AuthenticateUserConsent/AuthenticateUserConsent, outputTemplate=esignet/Consent/AuthenticateUserConsent/AuthenticateUserConsentResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Authenticate user consent with otp for claim2 valid details VID, uniqueIdentifier=null, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.PostWithAutogenIdWithOtpGenerate.test(PostWithAutogenIdWithOtpGenerate.java:98)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_AuthenticateUserIDP_Consent_Vid_Otp_Invalid_IndividualId_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PostWithAutogenIdWithOtpGenerate |
| Testcase Input |
| testCaseName=ESignet_AuthenticateUserIDP_Consent_Vid_Otp_Invalid_IndividualId_Neg, endPoint=/v1/esignet/authorization/v2/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_Consent_Invalid_Scen_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_Consent_Invalid_Scen_Smoke_sid_transactionId$", "individualId": "sdfsdfsdf", "authFactorType" : "OTP", "challenge" : "$ID:AddIdentity_Consent_Vid_smoke_Pos_EMAIL$", "sendOtp":{ "encodedHash": "$ID:OAuthDetailsRequest_Consent_Invalid_Scen_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_Consent_Invalid_Scen_Smoke_sid_transactionId$", "individualId": "$ID:Generate_Perpetual_VID_Consent_Valid_Smoke_sid_vid$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendOtp/SendOtp", "sendOtpEndPoint": "/v1/esignet/authorization/send-otp" } }, output={ "errors": [ { "errorCode": "IDA-MLC-009" } ], "sendOtpResp":{ "sendOtpResTemplate":"esignet/SendOtp/SendOtpResult" } }, inputTemplate=esignet/Consent/AuthenticateUserConsent/AuthenticateUserConsent, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Authenticate user consent Otp with invalid individualId VID, uniqueIdentifier=null, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.PostWithAutogenIdWithOtpGenerate.test(PostWithAutogenIdWithOtpGenerate.java:98)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_AuthenticateUserIDP_Consent_Vid_Otp_Invalid_TransactionId_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PostWithAutogenIdWithOtpGenerate |
| Testcase Input |
| testCaseName=ESignet_AuthenticateUserIDP_Consent_Vid_Otp_Invalid_TransactionId_Neg, endPoint=/v1/esignet/authorization/v2/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_Consent_Invalid_Scen_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "skdfsjkdfbk", "individualId": "$ID:Generate_Perpetual_VID_Consent_Valid_Smoke_sid_vid$", "authFactorType" : "OTP", "challenge" : "$ID:AddIdentity_Consent_Vid_smoke_Pos_EMAIL$", "sendOtp":{ "encodedHash": "$ID:OAuthDetailsRequest_Consent_Invalid_Scen_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_Consent_Invalid_Scen_Smoke_sid_transactionId$", "individualId": "$ID:Generate_Perpetual_VID_Consent_Valid_Smoke_sid_vid$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendOtp/SendOtp", "sendOtpEndPoint": "/v1/esignet/authorization/send-otp" } }, output={ "errors": [ { "errorCode": "invalid_transaction" } ], "sendOtpResp":{ "sendOtpResTemplate":"esignet/SendOtp/SendOtpResult" } }, inputTemplate=esignet/Consent/AuthenticateUserConsent/AuthenticateUserConsent, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Authenticate user consent Otp with invalid transactionId VID, uniqueIdentifier=null, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.PostWithAutogenIdWithOtpGenerate.test(PostWithAutogenIdWithOtpGenerate.java:98)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_AuthenticateUserIDP_Consent_Vid_Otp_Valid_Smoke |
| Testcase Dependency |
| [] |
| Class Name |
| PostWithAutogenIdWithOtpGenerate |
| Testcase Input |
| testCaseName=ESignet_AuthenticateUserIDP_Consent_Vid_Otp_Valid_Smoke, endPoint=/v1/esignet/authorization/v2/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_Consent_Vid_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_Consent_Vid_all_Valid_Smoke_sid_transactionId$", "individualId": "$ID:Generate_Perpetual_VID_Consent_Valid_Smoke_sid_vid$", "authFactorType" : "OTP", "challenge" : "$ID:AddIdentity_Consent_Vid_smoke_Pos_EMAIL$", "sendOtp":{ "encodedHash": "$ID:OAuthDetailsRequest_Consent_Vid_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_Consent_Vid_all_Valid_Smoke_sid_transactionId$", "individualId": "$ID:Generate_Perpetual_VID_Consent_Valid_Smoke_sid_vid$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendOtp/SendOtp", "sendOtpEndPoint": "/v1/esignet/authorization/send-otp" } }, output={ "consentAction": "CAPTURE", "sendOtpResp":{ "sendOtpResTemplate":"esignet/SendOtp/SendOtpResult" } }, inputTemplate=esignet/Consent/AuthenticateUserConsent/AuthenticateUserConsent, outputTemplate=esignet/Consent/AuthenticateUserConsent/AuthenticateUserConsentResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Authenticate user consent with otp and valid details VID, uniqueIdentifier=null, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.PostWithAutogenIdWithOtpGenerate.test(PostWithAutogenIdWithOtpGenerate.java:98)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_AuthenticateUserIDP_Consent_Vid_User2_Otp_Valid_Smoke |
| Testcase Dependency |
| [] |
| Class Name |
| PostWithAutogenIdWithOtpGenerate |
| Testcase Input |
| testCaseName=ESignet_AuthenticateUserIDP_Consent_Vid_User2_Otp_Valid_Smoke, endPoint=/v1/esignet/authorization/v2/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_Consent_Vid_User2_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_Consent_Vid_User2_all_Valid_Smoke_sid_transactionId$", "individualId": "$ID:Generate_Perpetual_VID_Consent_Valid_Smoke_sid_vid$", "authFactorType" : "OTP", "challenge" : "$ID:AddIdentity_Consent_Vid_smoke_Pos_EMAIL$", "sendOtp":{ "encodedHash": "$ID:OAuthDetailsRequest_Consent_Vid_User2_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_Consent_Vid_User2_all_Valid_Smoke_sid_transactionId$", "individualId": "$ID:Generate_Perpetual_VID_Consent_Valid_Smoke_sid_vid$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendOtp/SendOtp", "sendOtpEndPoint": "/v1/esignet/authorization/send-otp" } }, output={ "consentAction": "CAPTURE", "sendOtpResp":{ "sendOtpResTemplate":"esignet/SendOtp/SendOtpResult" } }, inputTemplate=esignet/Consent/AuthenticateUserConsent/AuthenticateUserConsent, outputTemplate=esignet/Consent/AuthenticateUserConsent/AuthenticateUserConsentResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Authenticate user consent Otp for User2 with valid details UIN, uniqueIdentifier=null, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.PostWithAutogenIdWithOtpGenerate.test(PostWithAutogenIdWithOtpGenerate.java:98)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_AuthenticateUserIDP_Consent_uin_AuthCode |
| Testcase Dependency |
| [] |
| Class Name |
| PostWithAutogenIdWithOtpGenerate |
| Testcase Input |
| testCaseName=ESignet_AuthenticateUserIDP_Consent_uin_AuthCode, endPoint=/v1/esignet/authorization/v2/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_Consent_all_Valid_authCodeNeg_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_Consent_all_Valid_authCodeNeg_sid_transactionId$", "individualId": "$ID:AddIdentity_L2_Valid_Parameters_consent_authcode_Pos_UIN$", "authFactorType" : "OTP", "challenge" : "$ID:AddIdentity_L2_Valid_Parameters_consent_authcode_Pos_EMAIL$", "sendOtp":{ "encodedHash": "$ID:OAuthDetailsRequest_Consent_all_Valid_authCodeNeg_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_Consent_all_Valid_authCodeNeg_sid_transactionId$", "individualId": "$ID:AddIdentity_L2_Valid_Parameters_consent_authcode_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendOtp/SendOtp", "sendOtpEndPoint": "/v1/esignet/authorization/send-otp" } }, output={ "consentAction": "CAPTURE", "sendOtpResp":{ "sendOtpResTemplate":"esignet/SendOtp/SendOtpResult" } }, inputTemplate=esignet/Consent/AuthenticateUserConsent/AuthenticateUserConsent, outputTemplate=esignet/Consent/AuthenticateUserConsent/AuthenticateUserConsentResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Authenticate user consent with otp and valid details UIN, uniqueIdentifier=null, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_AuthenticateUserIDP_Consent_uin_AuthCode_OnlyOptionalClaim |
| Testcase Dependency |
| [] |
| Class Name |
| PostWithAutogenIdWithOtpGenerate |
| Testcase Input |
| testCaseName=ESignet_AuthenticateUserIDP_Consent_uin_AuthCode_OnlyOptionalClaim, endPoint=/v1/esignet/authorization/v2/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_Consent_all_withOnly_OptionalClaim_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_Consent_all_withOnly_OptionalClaim_sid_transactionId$", "individualId": "$ID:AddIdentity_L2_Valid_Parameters_consent_authcode_Pos_UIN$", "authFactorType" : "OTP", "challenge" : "$ID:AddIdentity_L2_Valid_Parameters_consent_authcode_Pos_EMAIL$", "sendOtp":{ "encodedHash": "$ID:OAuthDetailsRequest_Consent_all_withOnly_OptionalClaim_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_Consent_all_withOnly_OptionalClaim_sid_transactionId$", "individualId": "$ID:AddIdentity_L2_Valid_Parameters_consent_authcode_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendOtp/SendOtp", "sendOtpEndPoint": "/v1/esignet/authorization/send-otp" } }, output={ "consentAction": "CAPTURE", "sendOtpResp":{ "sendOtpResTemplate":"esignet/SendOtp/SendOtpResult" } }, inputTemplate=esignet/Consent/AuthenticateUserConsent/AuthenticateUserConsent, outputTemplate=esignet/Consent/AuthenticateUserConsent/AuthenticateUserConsentResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Authenticate user consent with otp and valid details UIN, uniqueIdentifier=null, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_AuthenticateUserIDP_Consent_uin_AuthCode_OnlyOptionalClaim_user2 |
| Testcase Dependency |
| [] |
| Class Name |
| PostWithAutogenIdWithOtpGenerate |
| Testcase Input |
| testCaseName=ESignet_AuthenticateUserIDP_Consent_uin_AuthCode_OnlyOptionalClaim_user2, endPoint=/v1/esignet/authorization/v2/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_Consent_all_withOnly_OptionalClaim_user2_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_Consent_all_withOnly_OptionalClaim_user2_sid_transactionId$", "individualId": "$ID:AddIdentity_L2_Valid_Parameters_consent_authcode_Pos_UIN$", "authFactorType" : "OTP", "challenge" : "$ID:AddIdentity_L2_Valid_Parameters_consent_authcode_Pos_EMAIL$", "sendOtp":{ "encodedHash": "$ID:OAuthDetailsRequest_Consent_all_withOnly_OptionalClaim_user2_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_Consent_all_withOnly_OptionalClaim_user2_sid_transactionId$", "individualId": "$ID:AddIdentity_L2_Valid_Parameters_consent_authcode_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendOtp/SendOtp", "sendOtpEndPoint": "/v1/esignet/authorization/send-otp" } }, output={ "consentAction": "CAPTURE", "sendOtpResp":{ "sendOtpResTemplate":"esignet/SendOtp/SendOtpResult" } }, inputTemplate=esignet/Consent/AuthenticateUserConsent/AuthenticateUserConsent, outputTemplate=esignet/Consent/AuthenticateUserConsent/AuthenticateUserConsentResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Authenticate user consent with otp and valid details UIN, uniqueIdentifier=null, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_AuthenticateUserIDP_Consent_uin_Otp_Claim2_Valid_Smoke |
| Testcase Dependency |
| [] |
| Class Name |
| PostWithAutogenIdWithOtpGenerate |
| Testcase Input |
| testCaseName=ESignet_AuthenticateUserIDP_Consent_uin_Otp_Claim2_Valid_Smoke, endPoint=/v1/esignet/authorization/v2/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_Consent_Claim2_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_Consent_Claim2_all_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_Consent_smoke_Pos_UIN$", "authFactorType" : "OTP", "challenge" : "$ID:AddIdentity_Consent_smoke_Pos_EMAIL$", "sendOtp":{ "encodedHash": "$ID:OAuthDetailsRequest_Consent_Claim2_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_Consent_Claim2_all_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_Consent_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendOtp/SendOtp", "sendOtpEndPoint": "/v1/esignet/authorization/send-otp" } }, output={ "consentAction": "CAPTURE", "sendOtpResp":{ "sendOtpResTemplate":"esignet/SendOtp/SendOtpResult" } }, inputTemplate=esignet/Consent/AuthenticateUserConsent/AuthenticateUserConsent, outputTemplate=esignet/Consent/AuthenticateUserConsent/AuthenticateUserConsentResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Authenticate user consent with otp for claim2 valid details UIN, uniqueIdentifier=null, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_AuthenticateUserIDP_Consent_uin_Otp_Invalid_IndividualId_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PostWithAutogenIdWithOtpGenerate |
| Testcase Input |
| testCaseName=ESignet_AuthenticateUserIDP_Consent_uin_Otp_Invalid_IndividualId_Neg, endPoint=/v1/esignet/authorization/v2/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_Consent_Invalid_Scen_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_Consent_Invalid_Scen_Smoke_sid_transactionId$", "individualId": "jndjksgl", "authFactorType" : "OTP", "challenge" : "$ID:AddIdentity_Consent_smoke_Pos_EMAIL$", "sendOtp":{ "encodedHash": "$ID:OAuthDetailsRequest_Consent_Invalid_Scen_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_Consent_Invalid_Scen_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_Consent_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendOtp/SendOtp", "sendOtpEndPoint": "/v1/esignet/authorization/send-otp" } }, output={ "errors": [ { "errorCode": "IDA-MLC-009" } ], "sendOtpResp":{ "sendOtpResTemplate":"esignet/SendOtp/SendOtpResult" } }, inputTemplate=esignet/Consent/AuthenticateUserConsent/AuthenticateUserConsent, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=IDA-MLC-009,invalid_individual_id,, kycFields=null, description=Authenticate user consent Otp with invalid individualId UIN, uniqueIdentifier=null, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_AuthenticateUserIDP_Consent_uin_Otp_Invalid_TransactionId_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PostWithAutogenIdWithOtpGenerate |
| Testcase Input |
| testCaseName=ESignet_AuthenticateUserIDP_Consent_uin_Otp_Invalid_TransactionId_Neg, endPoint=/v1/esignet/authorization/v2/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_Consent_Invalid_Scen_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "skdfsjkdfbk", "individualId": "$ID:AddIdentity_Consent_smoke_Pos_UIN$", "authFactorType" : "OTP", "challenge" : "$ID:AddIdentity_Consent_smoke_Pos_EMAIL$", "sendOtp":{ "encodedHash": "$ID:OAuthDetailsRequest_Consent_Invalid_Scen_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_Consent_Invalid_Scen_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_Consent_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendOtp/SendOtp", "sendOtpEndPoint": "/v1/esignet/authorization/send-otp" } }, output={ "errors": [ { "errorCode": "invalid_transaction" } ], "sendOtpResp":{ "sendOtpResTemplate":"esignet/SendOtp/SendOtpResult" } }, inputTemplate=esignet/Consent/AuthenticateUserConsent/AuthenticateUserConsent, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Authenticate user consent Otp with invalid transactionId UIN, uniqueIdentifier=null, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_AuthenticateUserIDP_Consent_uin_Otp_Valid_Smoke |
| Testcase Dependency |
| [] |
| Class Name |
| PostWithAutogenIdWithOtpGenerate |
| Testcase Input |
| testCaseName=ESignet_AuthenticateUserIDP_Consent_uin_Otp_Valid_Smoke, endPoint=/v1/esignet/authorization/v2/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_Consent_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_Consent_all_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_Consent_smoke_Pos_UIN$", "authFactorType" : "OTP", "challenge" : "$ID:AddIdentity_Consent_smoke_Pos_EMAIL$", "sendOtp":{ "encodedHash": "$ID:OAuthDetailsRequest_Consent_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_Consent_all_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_Consent_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendOtp/SendOtp", "sendOtpEndPoint": "/v1/esignet/authorization/send-otp" } }, output={ "consentAction": "CAPTURE", "sendOtpResp":{ "sendOtpResTemplate":"esignet/SendOtp/SendOtpResult" } }, inputTemplate=esignet/Consent/AuthenticateUserConsent/AuthenticateUserConsent, outputTemplate=esignet/Consent/AuthenticateUserConsent/AuthenticateUserConsentResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Authenticate user consent with otp and valid details UIN, uniqueIdentifier=null, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_AuthenticateUserIDP_Consent_uin_User2_Otp_Valid_Smoke |
| Testcase Dependency |
| [] |
| Class Name |
| PostWithAutogenIdWithOtpGenerate |
| Testcase Input |
| testCaseName=ESignet_AuthenticateUserIDP_Consent_uin_User2_Otp_Valid_Smoke, endPoint=/v1/esignet/authorization/v2/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_Consent_User2_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_Consent_User2_all_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_Consent_smoke_Pos_UIN$", "authFactorType" : "OTP", "challenge" : "$ID:AddIdentity_Consent_smoke_Pos_EMAIL$", "sendOtp":{ "encodedHash": "$ID:OAuthDetailsRequest_Consent_User2_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_Consent_User2_all_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_Consent_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendOtp/SendOtp", "sendOtpEndPoint": "/v1/esignet/authorization/send-otp" } }, output={ "consentAction": "CAPTURE", "sendOtpResp":{ "sendOtpResTemplate":"esignet/SendOtp/SendOtpResult" } }, inputTemplate=esignet/Consent/AuthenticateUserConsent/AuthenticateUserConsent, outputTemplate=esignet/Consent/AuthenticateUserConsent/AuthenticateUserConsentResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Authenticate user consent Otp for User2 with valid details UIN, uniqueIdentifier=null, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_AuthorizationCode_Consent_Vid_All_Valid_Smoke_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_AuthorizationCode_Consent_Vid_All_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/auth-code, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_Consent_Vid_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_Consent_Vid_all_Valid_Smoke_sid_transactionId$", "acceptedClaims": [{claim: "name"},{claim: "gender"},{claim: "email"}] }, output={ }, inputTemplate=esignet/Consent/AuthorizationCodeConsent/AuthorizationCodeConsent, outputTemplate=esignet/Consent/AuthorizationCodeConsent/AuthorizationCodeConsentResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=AuthorizationCode consent with all valid details VID, uniqueIdentifier=null, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:101)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_AuthorizationCode_Consent_Vid_Claim2_All_Valid_Smoke_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_AuthorizationCode_Consent_Vid_Claim2_All_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/auth-code, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_Consent_Vid_Claim2_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_Consent_Vid_Claim2_all_Valid_Smoke_sid_transactionId$", "acceptedClaims": [{claim: "name"},{claim: "gender"},{claim: "email"}] }, output={ }, inputTemplate=esignet/Consent/AuthorizationCodeConsent/AuthorizationCodeConsent, outputTemplate=esignet/Consent/AuthorizationCodeConsent/AuthorizationCodeConsentResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=AuthorizationCode consent with claim2 and all valid details VID, uniqueIdentifier=null, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:101)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_AuthorizationCode_Consent_uin_AcceptedClaim_without_EssentialClaim |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_AuthorizationCode_Consent_uin_AcceptedClaim_without_EssentialClaim, endPoint=/v1/esignet/authorization/auth-code, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_Consent_all_Valid_authCodeNeg_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_Consent_all_Valid_authCodeNeg_sid_transactionId$", "acceptedClaims": [{claim: "gender"},{claim: "picture"}] }, output={ "errors": [ { "errorCode": "invalid_accepted_claim" } ] }, inputTemplate=esignet/Consent/AuthorizationCodeConsent/AuthorizationCodeConsent, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=AuthorizationCode consent without_EssentialClaim, uniqueIdentifier=TC_ESignet_AuthorizationCodeConsent_02, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_AuthorizationCode_Consent_uin_All_Valid_Smoke_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_AuthorizationCode_Consent_uin_All_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/auth-code, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_Consent_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_Consent_all_Valid_Smoke_sid_transactionId$", "acceptedClaims": [{claim: "name"},{claim: "gender"},{claim: "email"}] }, output={ }, inputTemplate=esignet/Consent/AuthorizationCodeConsent/AuthorizationCodeConsent, outputTemplate=esignet/Consent/AuthorizationCodeConsent/AuthorizationCodeConsentResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=AuthorizationCode consent with all valid details UIN, uniqueIdentifier=null, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_AuthorizationCode_Consent_uin_Claim2_All_Valid_Smoke_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_AuthorizationCode_Consent_uin_Claim2_All_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/auth-code, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_Consent_Claim2_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_Consent_Claim2_all_Valid_Smoke_sid_transactionId$", "acceptedClaims": [{claim: "name"},{claim: "gender"},{claim: "email"}] }, output={ }, inputTemplate=esignet/Consent/AuthorizationCodeConsent/AuthorizationCodeConsent, outputTemplate=esignet/Consent/AuthorizationCodeConsent/AuthorizationCodeConsentResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=AuthorizationCode consent with claim2 and all valid details UIN, uniqueIdentifier=null, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_AuthorizationCode_Consent_uin_invalid_AcceptedClaim |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_AuthorizationCode_Consent_uin_invalid_AcceptedClaim, endPoint=/v1/esignet/authorization/auth-code, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_Consent_all_Valid_authCodeNeg_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_Consent_all_Valid_authCodeNeg_sid_transactionId$", "acceptedClaims": [{claim: "residenceStatus"}] }, output={ "errors": [ { "errorCode": "invalid_accepted_claim" } ] }, inputTemplate=esignet/Consent/AuthorizationCodeConsent/AuthorizationCodeConsent, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=AuthorizationCode consent with invalid_AcceptedClaim, uniqueIdentifier=TC_ESignet_AuthorizationCodeConsent_01, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_AuthorizationCode_Consent_uin_withOnly_OptionalClaim_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_AuthorizationCode_Consent_uin_withOnly_OptionalClaim_sid, endPoint=/v1/esignet/authorization/auth-code, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_Consent_all_withOnly_OptionalClaim_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_Consent_all_withOnly_OptionalClaim_sid_transactionId$", "acceptedClaims": [{claim: "gender"},{claim: "name"}] }, output={ }, inputTemplate=esignet/Consent/AuthorizationCodeConsent/AuthorizationCodeConsent, outputTemplate=esignet/Consent/AuthorizationCodeConsent/AuthorizationCodeConsentResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=AuthorizationCode with only optional claim, uniqueIdentifier=TC_ESignet_AuthorizationCodeConsent_06, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_AuthorizationCode_Consent_uin_with_OneessentialClaimAllOptionalClaim |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_AuthorizationCode_Consent_uin_with_OneessentialClaimAllOptionalClaim, endPoint=/v1/esignet/authorization/auth-code, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_Consent_all_Valid_authCodeNeg_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_Consent_all_Valid_authCodeNeg_sid_transactionId$", "acceptedClaims": [{claim: "name"},{claim: "picture"},{claim: "gender"}] }, output={ "errors": [ { "errorCode": "invalid_accepted_claim" } ] }, inputTemplate=esignet/Consent/AuthorizationCodeConsent/AuthorizationCodeConsent, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=AuthorizationCode with One essential Claim and All OptionalClaim, uniqueIdentifier=TC_ESignet_AuthorizationCodeConsent_03, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_AuthorizationCode_Consent_uin_with_onlyEssentialClain_asAcceptedClaim_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_AuthorizationCode_Consent_uin_with_onlyEssentialClain_asAcceptedClaim_sid, endPoint=/v1/esignet/authorization/auth-code, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_Consent_all_Valid_authCodeNeg_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_Consent_all_Valid_authCodeNeg_sid_transactionId$", "acceptedClaims": [{claim: "name"},{claim: "email"}] }, output={ }, inputTemplate=esignet/Consent/AuthorizationCodeConsent/AuthorizationCodeConsent, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=AuthorizationCode with onlyEssentialClaim asAcceptedClaim, uniqueIdentifier=TC_ESignet_AuthorizationCodeConsent_04, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_AuthorizationCode_Consent_uin_withoutEssentialClaim |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_AuthorizationCode_Consent_uin_withoutEssentialClaim, endPoint=/v1/esignet/authorization/auth-code, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_Consent_all_Valid_authCodeNeg_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_Consent_all_Valid_authCodeNeg_sid_transactionId$", "acceptedClaims": [] }, output={ "errors": [ { "errorCode": "invalid_accepted_claim" } ] }, inputTemplate=esignet/Consent/AuthorizationCodeConsent/AuthorizationCodeConsent, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=AuthorizationCode without essential claim if there is requested essential claim, uniqueIdentifier=TC_ESignet_AuthorizationCodeConsent_05, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_AuthorizationCode_Consent_uin_without_acceptedClaimValue_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_AuthorizationCode_Consent_uin_without_acceptedClaimValue_sid, endPoint=/v1/esignet/authorization/auth-code, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_Consent_all_withOnly_OptionalClaim_user2_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_Consent_all_withOnly_OptionalClaim_user2_sid_transactionId$", "acceptedClaims": [] }, output={ }, inputTemplate=esignet/Consent/AuthorizationCodeConsent/AuthorizationCodeConsent, outputTemplate=esignet/Consent/AuthorizationCodeConsent/AuthorizationCodeConsentResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=AuthorizationCode by not providing any accepted claims if there is no requested essential claims, uniqueIdentifier=TC_ESignet_AuthorizationCodeConsent_07, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_GenerateToken_Consent_Vid_Claim2_Valid_Smoke_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenIdForUrlEncoded |
| Testcase Input |
| testCaseName=ESignet_GenerateToken_Consent_Vid_Claim2_Valid_Smoke_sid, endPoint=$GETENDPOINTFROMWELLKNOWN$, role=resident, templateFields=null, input={ "grant_type": "authorization_code", "code": "$ID:AuthorizationCode_Consent_Vid_Claim2_All_Valid_Smoke_sid_code$", "client_id": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "client_assertion_type": "urn:ietf:params:oauth:client-assertion-type:jwt-bearer", "client_assertion": "$CLIENT_ASSERTION_JWK$", "redirect_uri": "$IDPREDIRECTURI$" }, output={ "token_type": "Bearer" }, inputTemplate=esignet/Consent/GenerateTokenConsent/GenerateTokenConsent, outputTemplate=esignet/Consent/GenerateTokenConsent/GenerateTokenConsentResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generate token consent with claim2 and valid details VID, uniqueIdentifier=null, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenIdForUrlEncoded.test(SimplePostForAutoGenIdForUrlEncoded.java:102)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_GenerateToken_Consent_Vid_Valid_Smoke_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenIdForUrlEncoded |
| Testcase Input |
| testCaseName=ESignet_GenerateToken_Consent_Vid_Valid_Smoke_sid, endPoint=$GETENDPOINTFROMWELLKNOWN$, role=resident, templateFields=null, input={ "grant_type": "authorization_code", "code": "$ID:AuthorizationCode_Consent_Vid_All_Valid_Smoke_sid_code$", "client_id": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "client_assertion_type": "urn:ietf:params:oauth:client-assertion-type:jwt-bearer", "client_assertion": "$CLIENT_ASSERTION_JWK$", "redirect_uri": "$IDPREDIRECTURI$" }, output={ "token_type": "Bearer" }, inputTemplate=esignet/Consent/GenerateTokenConsent/GenerateTokenConsent, outputTemplate=esignet/Consent/GenerateTokenConsent/GenerateTokenConsentResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generate token consent with valid details VID, uniqueIdentifier=null, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenIdForUrlEncoded.test(SimplePostForAutoGenIdForUrlEncoded.java:102)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_GenerateToken_Consent_uin_Claim2_Valid_Smoke_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenIdForUrlEncoded |
| Testcase Input |
| testCaseName=ESignet_GenerateToken_Consent_uin_Claim2_Valid_Smoke_sid, endPoint=$GETENDPOINTFROMWELLKNOWN$, role=resident, templateFields=null, input={ "grant_type": "authorization_code", "code": "$ID:AuthorizationCode_Consent_uin_Claim2_All_Valid_Smoke_sid_code$", "client_id": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "client_assertion_type": "urn:ietf:params:oauth:client-assertion-type:jwt-bearer", "client_assertion": "$CLIENT_ASSERTION_JWK$", "redirect_uri": "$IDPREDIRECTURI$" }, output={ "token_type": "Bearer" }, inputTemplate=esignet/Consent/GenerateTokenConsent/GenerateTokenConsent, outputTemplate=esignet/Consent/GenerateTokenConsent/GenerateTokenConsentResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generate token consent with claim2 and valid details UIN, uniqueIdentifier=null, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_GenerateToken_Consent_uin_Valid_Smoke_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenIdForUrlEncoded |
| Testcase Input |
| testCaseName=ESignet_GenerateToken_Consent_uin_Valid_Smoke_sid, endPoint=$GETENDPOINTFROMWELLKNOWN$, role=resident, templateFields=null, input={ "grant_type": "authorization_code", "code": "$ID:AuthorizationCode_Consent_uin_All_Valid_Smoke_sid_code$", "client_id": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "client_assertion_type": "urn:ietf:params:oauth:client-assertion-type:jwt-bearer", "client_assertion": "$CLIENT_ASSERTION_JWK$", "redirect_uri": "$IDPREDIRECTURI$" }, output={ "token_type": "Bearer" }, inputTemplate=esignet/Consent/GenerateTokenConsent/GenerateTokenConsent, outputTemplate=esignet/Consent/GenerateTokenConsent/GenerateTokenConsentResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generate token consent with valid details UIN, uniqueIdentifier=null, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_GetOidcUserInfo_Consent_Vid_IdpAccessToken_StatusCode_Claim2_Valid_Smoke_sid |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=ESignet_GetOidcUserInfo_Consent_Vid_IdpAccessToken_StatusCode_Claim2_Valid_Smoke_sid, endPoint=/v1/esignet/oidc/userinfo, role=resident, templateFields=null, input={ "idpAccessToken": "$ID:GenerateToken_Consent_Vid_Claim2_Valid_Smoke_sid_access_token$" }, output=200, inputTemplate=esignet/Consent/GetOidcUserInfoConsent/GetOidcUserInfoConsent, outputTemplate=esignet/Consent/GetOidcUserInfoConsent/GetOidcUserInfoConsentResult, restMethod=get, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Get OIDC user info consent with claim2 and valid details VID, uniqueIdentifier=null, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.GetWithParam.test(GetWithParam.java:96)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_GetOidcUserInfo_Consent_Vid_IdpAccessToken_StatusCode_Valid_Smoke_sid |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=ESignet_GetOidcUserInfo_Consent_Vid_IdpAccessToken_StatusCode_Valid_Smoke_sid, endPoint=/v1/esignet/oidc/userinfo, role=resident, templateFields=null, input={ "idpAccessToken": "$ID:GenerateToken_Consent_Vid_Valid_Smoke_sid_access_token$" }, output=200, inputTemplate=esignet/Consent/GetOidcUserInfoConsent/GetOidcUserInfoConsent, outputTemplate=esignet/Consent/GetOidcUserInfoConsent/GetOidcUserInfoConsentResult, restMethod=get, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Get OIDC user info consent with all valid details VID, uniqueIdentifier=null, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.GetWithParam.test(GetWithParam.java:96)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_GetOidcUserInfo_Consent_uin_IdpAccessToken_StatusCode_Claim2_Valid_Smoke_sid |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=ESignet_GetOidcUserInfo_Consent_uin_IdpAccessToken_StatusCode_Claim2_Valid_Smoke_sid, endPoint=/v1/esignet/oidc/userinfo, role=resident, templateFields=null, input={ "idpAccessToken": "$ID:GenerateToken_Consent_uin_Claim2_Valid_Smoke_sid_access_token$" }, output=200, inputTemplate=esignet/Consent/GetOidcUserInfoConsent/GetOidcUserInfoConsent, outputTemplate=esignet/Consent/GetOidcUserInfoConsent/GetOidcUserInfoConsentResult, restMethod=get, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Get OIDC user info consent with claim2 and valid details UIN, uniqueIdentifier=null, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_GetOidcUserInfo_Consent_uin_IdpAccessToken_StatusCode_Valid_Smoke_sid |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=ESignet_GetOidcUserInfo_Consent_uin_IdpAccessToken_StatusCode_Valid_Smoke_sid, endPoint=/v1/esignet/oidc/userinfo, role=resident, templateFields=null, input={ "idpAccessToken": "$ID:GenerateToken_Consent_uin_Valid_Smoke_sid_access_token$" }, output=200, inputTemplate=esignet/Consent/GetOidcUserInfoConsent/GetOidcUserInfoConsent, outputTemplate=esignet/Consent/GetOidcUserInfoConsent/GetOidcUserInfoConsentResult, restMethod=get, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Get OIDC user info consent with all valid details UIN, uniqueIdentifier=null, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_OAuthDetailsRequest_Consent_Vid_2nd_Valid_Smoke_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_OAuthDetailsRequest_Consent_Vid_2nd_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:generated-code", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en" }, output={ }, inputTemplate=esignet/Consent/OAuthDetailsRequestConsent/OAuthDetailsRequestConsent, outputTemplate=esignet/Consent/OAuthDetailsRequestConsent/OAuthDetailsRequestConsentResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Oauthdetails request consent 2nd with all valid details VID, uniqueIdentifier=TC_ESignet_OAuthDetailsRequest_06, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:101)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_OAuthDetailsRequest_SendOtp_Vid_Valid_Smoke_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_OAuthDetailsRequest_SendOtp_Vid_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:generated-code", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en" }, output={ }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Oauthdetails request sendOtp with all valid details VID, uniqueIdentifier=TC_ESignet_OAuthDetailsRequest_07, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:101)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_OAuthDetailsRequest_Vid_Valid_Smoke_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_OAuthDetailsRequest_Vid_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:generated-code", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en" }, output={ }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Oauthdetails request with all valid details VID, uniqueIdentifier=TC_ESignet_OAuthDetailsRequest_05, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:101)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_OAuthDetailsRequest_10all_Valid_Smoke_sid |
| Testcase Dependency |
| [TC_ESignet_CreateOIDCClient_01] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_OAuthDetailsRequest_10all_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:biometrics", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en" }, output={ }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Oauthdetails request 10 with all valid details, uniqueIdentifier=TC_ESignet_OAuthDetailsRequest_18, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_OAuthDetailsRequest_11all_Valid_Smoke_sid |
| Testcase Dependency |
| [TC_ESignet_CreateOIDCClient_01] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_OAuthDetailsRequest_11all_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:biometrics", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en" }, output={ }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Oauthdetails request 11 with all valid details, uniqueIdentifier=TC_ESignet_OAuthDetailsRequest_19, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_OAuthDetailsRequest_12all_Valid_Smoke_sid |
| Testcase Dependency |
| [TC_ESignet_CreateOIDCClient_01] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_OAuthDetailsRequest_12all_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:biometrics", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en" }, output={ }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Oauthdetails request 12 with all valid details, uniqueIdentifier=TC_ESignet_OAuthDetailsRequest_20, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_OAuthDetailsRequest_13all_Valid_Smoke_sid |
| Testcase Dependency |
| [TC_ESignet_CreateOIDCClient_01] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_OAuthDetailsRequest_13all_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:biometrics", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en" }, output={ }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Oauthdetails request 13 with all valid details, uniqueIdentifier=TC_ESignet_OAuthDetailsRequest_21, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_OAuthDetailsRequest_14all_Valid_Smoke_sid |
| Testcase Dependency |
| [TC_ESignet_CreateOIDCClient_01] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_OAuthDetailsRequest_14all_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:biometrics", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en" }, output={ }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Oauthdetails request 14 with all valid details, uniqueIdentifier=TC_ESignet_OAuthDetailsRequest_22, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_OAuthDetailsRequest_15all_Valid_Smoke_sid |
| Testcase Dependency |
| [TC_ESignet_CreateOIDCClient_01] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_OAuthDetailsRequest_15all_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:biometrics", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en" }, output={ }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Oauthdetails request 15 with all valid details, uniqueIdentifier=TC_ESignet_OAuthDetailsRequest_23, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_OAuthDetailsRequest_16all_Valid_Smoke_sid |
| Testcase Dependency |
| [TC_ESignet_CreateOIDCClient_01] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_OAuthDetailsRequest_16all_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:biometrics", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en" }, output={ }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Oauthdetails request 16 with all valid details, uniqueIdentifier=TC_ESignet_OAuthDetailsRequest_24, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_OAuthDetailsRequest_17all_Valid_Smoke_sid |
| Testcase Dependency |
| [TC_ESignet_CreateOIDCClient_01] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_OAuthDetailsRequest_17all_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:biometrics", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en" }, output={ }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Oauthdetails request 17 with all valid details, uniqueIdentifier=TC_ESignet_OAuthDetailsRequest_25, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_OAuthDetailsRequest_18all_Valid_Smoke_sid |
| Testcase Dependency |
| [TC_ESignet_CreateOIDCClient_01] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_OAuthDetailsRequest_18all_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:biometrics", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en" }, output={ }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Oauthdetails request 18 with all valid details, uniqueIdentifier=TC_ESignet_OAuthDetailsRequest_26, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_OAuthDetailsRequest_19all_Valid_Smoke_sid |
| Testcase Dependency |
| [TC_ESignet_CreateOIDCClient_01] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_OAuthDetailsRequest_19all_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:biometrics", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en" }, output={ }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Oauthdetails request 19 with all valid details, uniqueIdentifier=TC_ESignet_OAuthDetailsRequest_27, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_OAuthDetailsRequest_20all_Valid_Smoke_sid |
| Testcase Dependency |
| [TC_ESignet_CreateOIDCClient_01] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_OAuthDetailsRequest_20all_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:biometrics", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en" }, output={ }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Oauthdetails request 20 with all valid details, uniqueIdentifier=TC_ESignet_OAuthDetailsRequest_28, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_OAuthDetailsRequest_21all_Valid_Smoke_sid |
| Testcase Dependency |
| [TC_ESignet_CreateOIDCClient_01] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_OAuthDetailsRequest_21all_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:biometrics", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en" }, output={ }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Oauthdetails request 21 with all valid details, uniqueIdentifier=TC_ESignet_OAuthDetailsRequest_29, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_OAuthDetailsRequest_22all_Valid_Smoke_sid |
| Testcase Dependency |
| [TC_ESignet_CreateOIDCClient_01] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_OAuthDetailsRequest_22all_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:biometrics", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en" }, output={ }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Oauthdetails request 22 with all valid details, uniqueIdentifier=TC_ESignet_OAuthDetailsRequest_30, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_OAuthDetailsRequest_23all_Valid_Smoke_sid |
| Testcase Dependency |
| [TC_ESignet_CreateOIDCClient_01] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_OAuthDetailsRequest_23all_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:biometrics", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en" }, output={ }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Oauthdetails request 23 with all valid details, uniqueIdentifier=TC_ESignet_OAuthDetailsRequest_31, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_OAuthDetailsRequest_24all_Valid_Smoke_sid |
| Testcase Dependency |
| [TC_ESignet_CreateOIDCClient_01] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_OAuthDetailsRequest_24all_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:biometrics", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en" }, output={ }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Oauthdetails request 24 with all valid details, uniqueIdentifier=TC_ESignet_OAuthDetailsRequest_32, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_OAuthDetailsRequest_25all_Valid_Smoke_sid |
| Testcase Dependency |
| [TC_ESignet_CreateOIDCClient_01] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_OAuthDetailsRequest_25all_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:biometrics", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en" }, output={ }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Oauthdetails request 25 with all valid details, uniqueIdentifier=TC_ESignet_OAuthDetailsRequest_33, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_OAuthDetailsRequest_2_all_Valid_Smoke_sid |
| Testcase Dependency |
| [TC_ESignet_CreateOIDCClient_01] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_OAuthDetailsRequest_2_all_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:static-code mosip:idp:acr:generated-code", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en" }, output={ }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Oauthdetails request 2 with all valid details, uniqueIdentifier=TC_ESignet_OAuthDetailsRequest_34, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_OAuthDetailsRequest_2all_Valid_Smoke_sid |
| Testcase Dependency |
| [TC_ESignet_CreateOIDCClient_01] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_OAuthDetailsRequest_2all_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:biometrics", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en" }, output={ }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Oauthdetails request 2 with all valid details, uniqueIdentifier=TC_ESignet_OAuthDetailsRequest_10, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_OAuthDetailsRequest_2nd_Valid_Smoke_sid |
| Testcase Dependency |
| [TC_ESignet_CreateOIDCClient_01] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_OAuthDetailsRequest_2nd_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:biometrics mosip:idp:acr:generated-code", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en" }, output={ }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Oauthdetails request 2nd with all valid details, uniqueIdentifier=TC_ESignet_OAuthDetailsRequest_02, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_OAuthDetailsRequest_2nd_vid_Valid_Smoke_sid |
| Testcase Dependency |
| [TC_ESignet_CreateOIDCClient_01] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_OAuthDetailsRequest_2nd_vid_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:biometrics mosip:idp:acr:generated-code", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en" }, output={ }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Oauthdetails request 2nd with all valid details VID, uniqueIdentifier=TC_ESignet_OAuthDetailsRequest_03, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_OAuthDetailsRequest_3all_Valid_Smoke_sid |
| Testcase Dependency |
| [TC_ESignet_CreateOIDCClient_01] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_OAuthDetailsRequest_3all_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:biometrics", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en" }, output={ }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Oauthdetails request 3 with all valid details, uniqueIdentifier=TC_ESignet_OAuthDetailsRequest_11, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_OAuthDetailsRequest_4all_Valid_Smoke_sid |
| Testcase Dependency |
| [TC_ESignet_CreateOIDCClient_01] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_OAuthDetailsRequest_4all_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:biometrics", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en" }, output={ }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Oauthdetails request 4 with all valid details, uniqueIdentifier=TC_ESignet_OAuthDetailsRequest_12, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_OAuthDetailsRequest_5all_Valid_Smoke_sid |
| Testcase Dependency |
| [TC_ESignet_CreateOIDCClient_01] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_OAuthDetailsRequest_5all_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:biometrics", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en" }, output={ }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Oauthdetails request 5 with all valid details, uniqueIdentifier=TC_ESignet_OAuthDetailsRequest_13, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_OAuthDetailsRequest_6all_Valid_Smoke_sid |
| Testcase Dependency |
| [TC_ESignet_CreateOIDCClient_01] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_OAuthDetailsRequest_6all_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:biometrics", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en" }, output={ }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Oauthdetails request 6 with all valid details, uniqueIdentifier=TC_ESignet_OAuthDetailsRequest_14, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_OAuthDetailsRequest_7all_Valid_Smoke_sid |
| Testcase Dependency |
| [TC_ESignet_CreateOIDCClient_01] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_OAuthDetailsRequest_7all_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:biometrics", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en" }, output={ }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Oauthdetails request 7 with all valid details, uniqueIdentifier=TC_ESignet_OAuthDetailsRequest_15, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_OAuthDetailsRequest_8all_Valid_Smoke_sid |
| Testcase Dependency |
| [TC_ESignet_CreateOIDCClient_01] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_OAuthDetailsRequest_8all_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:biometrics", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en" }, output={ }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Oauthdetails request 8 with all valid details, uniqueIdentifier=TC_ESignet_OAuthDetailsRequest_16, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_OAuthDetailsRequest_9all_Valid_Smoke_sid |
| Testcase Dependency |
| [TC_ESignet_CreateOIDCClient_01] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_OAuthDetailsRequest_9all_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:biometrics", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en" }, output={ }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Oauthdetails request 9 with all valid details, uniqueIdentifier=TC_ESignet_OAuthDetailsRequest_17, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_OAuthDetailsRequest_Consent_2nd_Valid_Smoke_sid |
| Testcase Dependency |
| [TC_ESignet_CreateOIDCClient_01] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_OAuthDetailsRequest_Consent_2nd_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:generated-code", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en" }, output={ }, inputTemplate=esignet/Consent/OAuthDetailsRequestConsent/OAuthDetailsRequestConsent, outputTemplate=esignet/Consent/OAuthDetailsRequestConsent/OAuthDetailsRequestConsentResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Oauthdetails request consent 2nd with all valid details, uniqueIdentifier=TC_ESignet_OAuthDetailsRequest_04, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_OAuthDetailsRequest_Diff_requestTime_Neg |
| Testcase Dependency |
| [TC_ESignet_CreateOIDCClient_01] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_OAuthDetailsRequest_Diff_requestTime_Neg, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "2022-11-07T06:51:30.195Z", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:static-code mosip:idp:acr:generated-code", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en" }, output={ "errors": [ { "errorCode": "invalid_request" } ] }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Oauthdetails request with different requestTime, uniqueIdentifier=TC_ESignet_OAuthDetailsRequest_81, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_OAuthDetailsRequest_Empty_AcrValues_Pos |
| Testcase Dependency |
| [TC_ESignet_CreateOIDCClient_01] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_OAuthDetailsRequest_Empty_AcrValues_Pos, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en" }, output={ }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Oauthdetails request with empty value in AcrValues, uniqueIdentifier=TC_ESignet_OAuthDetailsRequest_57, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_OAuthDetailsRequest_Empty_Claims_Neg |
| Testcase Dependency |
| [TC_ESignet_CreateOIDCClient_01] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_OAuthDetailsRequest_Empty_Claims_Neg, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:static-code mosip:idp:acr:generated-code", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en", "claims": "" }, output={ "errors": [ { "errorCode": "unknown_error" } ] }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestEmptyClaims, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Oauthdetails request with empty value in Claims, uniqueIdentifier=TC_ESignet_OAuthDetailsRequest_60, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_OAuthDetailsRequest_Empty_ClientId_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_OAuthDetailsRequest_Empty_ClientId_Neg, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:static-code mosip:idp:acr:generated-code", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en" }, output={ "errors": [ { "errorCode": "invalid_client_id" } ] }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Oauthdetails request with empty value in ClientId, uniqueIdentifier=TC_ESignet_OAuthDetailsRequest_36, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_OAuthDetailsRequest_Empty_Nonce_Pos |
| Testcase Dependency |
| [TC_ESignet_CreateOIDCClient_01] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_OAuthDetailsRequest_Empty_Nonce_Pos, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:static-code mosip:idp:acr:generated-code", "nonce": "", "state": "eree2311", "claimsLocales": "en" }, output={ }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Oauthdetails request with empty value in Nonce, uniqueIdentifier=TC_ESignet_OAuthDetailsRequest_78, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_OAuthDetailsRequest_Empty_Prompt_Neg |
| Testcase Dependency |
| [TC_ESignet_CreateOIDCClient_01] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_OAuthDetailsRequest_Empty_Prompt_Neg, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "", "acrValues": "mosip:idp:acr:static-code mosip:idp:acr:generated-code", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en" }, output={ "errors": [ { "errorCode": "invalid_prompt" } ] }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Oauthdetails request with empty value in prompt, uniqueIdentifier=TC_ESignet_OAuthDetailsRequest_84, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_OAuthDetailsRequest_Empty_ResponseType_Neg |
| Testcase Dependency |
| [TC_ESignet_CreateOIDCClient_01] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_OAuthDetailsRequest_Empty_ResponseType_Neg, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:static-code mosip:idp:acr:generated-code", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en" }, output={ "errors": [ { "errorCode": "invalid_response_type" } ] }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Oauthdetails request with empty value in ResponseType, uniqueIdentifier=TC_ESignet_OAuthDetailsRequest_46, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_OAuthDetailsRequest_Empty_Scope_Neg |
| Testcase Dependency |
| [TC_ESignet_CreateOIDCClient_01] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_OAuthDetailsRequest_Empty_Scope_Neg, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:static-code mosip:idp:acr:generated-code", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en" }, output={ "errors": [ { "errorCode": "invalid_scope" } ] }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Oauthdetails request with empty value in Scope, uniqueIdentifier=TC_ESignet_OAuthDetailsRequest_51, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_OAuthDetailsRequest_Empty_State_Pos |
| Testcase Dependency |
| [TC_ESignet_CreateOIDCClient_01] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_OAuthDetailsRequest_Empty_State_Pos, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:static-code mosip:idp:acr:generated-code", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "", "claimsLocales": "en" }, output={ }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Oauthdetails request with empty value in state, uniqueIdentifier=TC_ESignet_OAuthDetailsRequest_73, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_OAuthDetailsRequest_Empty_claimsLocales_Pos |
| Testcase Dependency |
| [TC_ESignet_CreateOIDCClient_01] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_OAuthDetailsRequest_Empty_claimsLocales_Pos, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:static-code mosip:idp:acr:generated-code", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "" }, output={ }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Oauthdetails request with empty value in claimsLocales, uniqueIdentifier=TC_ESignet_OAuthDetailsRequest_64, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_OAuthDetailsRequest_Empty_display_Neg |
| Testcase Dependency |
| [TC_ESignet_CreateOIDCClient_01] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_OAuthDetailsRequest_Empty_display_Neg, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "", "prompt": "login", "acrValues": "mosip:idp:acr:static-code mosip:idp:acr:generated-code", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en" }, output={ "errors": [ { "errorCode": "invalid_display" } ] }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Oauthdetails request with empty value in display, uniqueIdentifier=TC_ESignet_OAuthDetailsRequest_68, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_OAuthDetailsRequest_Empty_redirectUri_Neg |
| Testcase Dependency |
| [TC_ESignet_CreateOIDCClient_01] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_OAuthDetailsRequest_Empty_redirectUri_Neg, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:static-code mosip:idp:acr:generated-code", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en" }, output={ "errors": [ { "errorCode": "invalid_redirect_uri" } ] }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Oauthdetails request with empty value in redirectUri, uniqueIdentifier=TC_ESignet_OAuthDetailsRequest_42, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_OAuthDetailsRequest_Exceding_Range_ClientId_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_OAuthDetailsRequest_Exceding_Range_ClientId_Neg, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "vc0neervbsu10dfbo2vu282lt0r9hf044b1q8wm957k97wpjmrmwz6kcbpv5p9zyocksfyg41u4rpm71hhqy29sqcixg1i0ed2aaxlfd9f5wtpf3py2igi3orhttvh6vqys16nmnke9qwjjr8byjflotzyw078t1azc9rvoftuhdis40mgy9uoyzoypwdbomdkjg3v9y216y7bfpiyoenhgaudirgn432u3c2x27z23zvd094m7ug4lvid8av6jhc24j", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:static-code mosip:idp:acr:generated-code", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en" }, output={ "errors": [ { "errorCode": "invalid_client_id" } ] }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Oauthdetails request with exceeding range in ClientId, uniqueIdentifier=TC_ESignet_OAuthDetailsRequest_39, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_OAuthDetailsRequest_Exceding_Range_State_Pos |
| Testcase Dependency |
| [TC_ESignet_CreateOIDCClient_01] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_OAuthDetailsRequest_Exceding_Range_State_Pos, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:static-code mosip:idp:acr:generated-code", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "aa1hmnkz7ee0c1te988gw9bkos5pb4mi830uf6wrxj6hs80z07rmtwpzvjr9qjhgw8aw2rf9iljprvvxxh4y94je13gl4vr9vwaq358tnov5bh3likbef6elkqnqvnn4gu9fh1pzui2b459m0xfwjdsjlinll1s6kayk29d01i3vx1uagewcoc39ssxm4feyci06zoimd6ot3c0w3w8genv1d0hk4ni9ym1mjkwclffj5tfiglipy9sn5fyjqway9c6y", "claimsLocales": "en" }, output={ }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Oauthdetails request with exceeding range in state, uniqueIdentifier=TC_ESignet_OAuthDetailsRequest_75, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_OAuthDetailsRequest_Invalid_AcrValues_Pos |
| Testcase Dependency |
| [TC_ESignet_CreateOIDCClient_01] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_OAuthDetailsRequest_Invalid_AcrValues_Pos, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:static", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en" }, output={ }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Oauthdetails request with Invalid AcrValues, uniqueIdentifier=TC_ESignet_OAuthDetailsRequest_53, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_OAuthDetailsRequest_Invalid_Claims_Pos |
| Testcase Dependency |
| [TC_ESignet_CreateOIDCClient_01] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_OAuthDetailsRequest_Invalid_Claims_Pos, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:static-code mosip:idp:acr:generated-code", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en" }, output={ }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestInvalidClaim, outputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Oauthdetails request with invalid Claims, uniqueIdentifier=TC_ESignet_OAuthDetailsRequest_61, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_OAuthDetailsRequest_Invalid_ClientId_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_OAuthDetailsRequest_Invalid_ClientId_Neg, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "reateOIDCClient_all_Valid_Smoke_sid_cl", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:static-code mosip:idp:acr:generated-code", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en" }, output={ "errors": [ { "errorCode": "invalid_client_id" } ] }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Oauthdetails request with Invalid ClientId, uniqueIdentifier=TC_ESignet_OAuthDetailsRequest_35, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_OAuthDetailsRequest_Invalid_Format_AcrValues_Pos |
| Testcase Dependency |
| [TC_ESignet_CreateOIDCClient_01] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_OAuthDetailsRequest_Invalid_Format_AcrValues_Pos, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp/acr:static?:code", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en" }, output={ }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Oauthdetails request with Invalid format AcrValues, uniqueIdentifier=TC_ESignet_OAuthDetailsRequest_54, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_OAuthDetailsRequest_Invalid_Prompt_Neg |
| Testcase Dependency |
| [TC_ESignet_CreateOIDCClient_01] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_OAuthDetailsRequest_Invalid_Prompt_Neg, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "abc", "acrValues": "mosip:idp:acr:static-code mosip:idp:acr:generated-code", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en" }, output={ "errors": [ { "errorCode": "invalid_prompt" } ] }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Oauthdetails request with invalid prompt, uniqueIdentifier=TC_ESignet_OAuthDetailsRequest_82, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_OAuthDetailsRequest_Invalid_Range_ClientId_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_OAuthDetailsRequest_Invalid_Range_ClientId_Neg, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": " ", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:static-code mosip:idp:acr:generated-code", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en" }, output={ "errors": [ { "errorCode": "invalid_client_id" } ] }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Oauthdetails request with Invalid range in ClientId, uniqueIdentifier=TC_ESignet_OAuthDetailsRequest_38, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_OAuthDetailsRequest_Invalid_ResponseType_Neg |
| Testcase Dependency |
| [TC_ESignet_CreateOIDCClient_01] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_OAuthDetailsRequest_Invalid_ResponseType_Neg, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "decode", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:static-code mosip:idp:acr:generated-code", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en" }, output={ "errors": [ { "errorCode": "invalid_response_type" } ] }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Oauthdetails request with Invalid ResponseType, uniqueIdentifier=TC_ESignet_OAuthDetailsRequest_44, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_OAuthDetailsRequest_Invalid_Scope_Neg |
| Testcase Dependency |
| [TC_ESignet_CreateOIDCClient_01] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_OAuthDetailsRequest_Invalid_Scope_Neg, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "email", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:static-code mosip:idp:acr:generated-code", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en" }, output={ "errors": [ { "errorCode": "invalid_scope" } ] }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Oauthdetails request with Invalid Scope, uniqueIdentifier=TC_ESignet_OAuthDetailsRequest_48, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_OAuthDetailsRequest_Invalid_State_Pos |
| Testcase Dependency |
| [TC_ESignet_CreateOIDCClient_01] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_OAuthDetailsRequest_Invalid_State_Pos, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:static-code mosip:idp:acr:generated-code", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "$$@#fdhfdkl", "claimsLocales": "en" }, output={ }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Oauthdetails request with invalid state, uniqueIdentifier=TC_ESignet_OAuthDetailsRequest_71, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_OAuthDetailsRequest_Invalid_claimsLocales_Pos |
| Testcase Dependency |
| [TC_ESignet_CreateOIDCClient_01] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_OAuthDetailsRequest_Invalid_claimsLocales_Pos, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:static-code mosip:idp:acr:generated-code", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "hn" }, output={ }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Oauthdetails request with invalid claimsLocales, uniqueIdentifier=TC_ESignet_OAuthDetailsRequest_63, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_OAuthDetailsRequest_Invalid_display_Neg |
| Testcase Dependency |
| [TC_ESignet_CreateOIDCClient_01] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_OAuthDetailsRequest_Invalid_display_Neg, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "abc", "prompt": "login", "acrValues": "mosip:idp:acr:static-code mosip:idp:acr:generated-code", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en" }, output={ "errors": [ { "errorCode": "invalid_display" } ] }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Oauthdetails request with invalid display, uniqueIdentifier=TC_ESignet_OAuthDetailsRequest_67, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_OAuthDetailsRequest_Invalid_redirectUri_Neg |
| Testcase Dependency |
| [TC_ESignet_CreateOIDCClient_01] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_OAuthDetailsRequest_Invalid_redirectUri_Neg, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "https://health-services.com", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:static-code mosip:idp:acr:generated-code", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en" }, output={ "errors": [ { "errorCode": "invalid_redirect_uri" } ] }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Oauthdetails request with Invalid redirectUri, uniqueIdentifier=TC_ESignet_OAuthDetailsRequest_40, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_OAuthDetailsRequest_Invalid_requestTime_Neg |
| Testcase Dependency |
| [TC_ESignet_CreateOIDCClient_01] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_OAuthDetailsRequest_Invalid_requestTime_Neg, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "2022-11-08T06:35:53", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:static-code mosip:idp:acr:generated-code", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en" }, output={ "errors": [ { "errorCode": "invalid_request" } ] }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Oauthdetails request with invalid requestTime, uniqueIdentifier=TC_ESignet_OAuthDetailsRequest_80, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_OAuthDetailsRequest_Missing_AcrValues_Pos |
| Testcase Dependency |
| [TC_ESignet_CreateOIDCClient_01] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_OAuthDetailsRequest_Missing_AcrValues_Pos, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "$REMOVE$", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en" }, output={ }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Oauthdetails request without AcrValues, uniqueIdentifier=TC_ESignet_OAuthDetailsRequest_56, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_OAuthDetailsRequest_Missing_Claims_Pos |
| Testcase Dependency |
| [TC_ESignet_CreateOIDCClient_01] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_OAuthDetailsRequest_Missing_Claims_Pos, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:static-code mosip:idp:acr:generated-code", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en", "claims": "$REMOVE$" }, output={ }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestEmptyClaims, outputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Oauthdetails request without Claims, uniqueIdentifier=TC_ESignet_OAuthDetailsRequest_59, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_OAuthDetailsRequest_Missing_ClientId_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_OAuthDetailsRequest_Missing_ClientId_Neg, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$REMOVE$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:static-code mosip:idp:acr:generated-code", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en" }, output={ "errors": [ { "errorCode": "invalid_client_id" } ] }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Oauthdetails request without ClientId, uniqueIdentifier=TC_ESignet_OAuthDetailsRequest_37, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_OAuthDetailsRequest_Missing_Nonce_Pos |
| Testcase Dependency |
| [TC_ESignet_CreateOIDCClient_01] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_OAuthDetailsRequest_Missing_Nonce_Pos, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:static-code mosip:idp:acr:generated-code", "nonce": "$REMOVE$", "state": "eree2311", "claimsLocales": "en" }, output={ }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Oauthdetails request without Nonce, uniqueIdentifier=TC_ESignet_OAuthDetailsRequest_77, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_OAuthDetailsRequest_Missing_Prompt_Pos |
| Testcase Dependency |
| [TC_ESignet_CreateOIDCClient_01] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_OAuthDetailsRequest_Missing_Prompt_Pos, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "$REMOVE$", "acrValues": "mosip:idp:acr:static-code mosip:idp:acr:generated-code", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en" }, output={ }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Oauthdetails request without prompt, uniqueIdentifier=TC_ESignet_OAuthDetailsRequest_83, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_OAuthDetailsRequest_Missing_ResponseType_Neg |
| Testcase Dependency |
| [TC_ESignet_CreateOIDCClient_01] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_OAuthDetailsRequest_Missing_ResponseType_Neg, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "$REMOVE$", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:static-code mosip:idp:acr:generated-code", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en" }, output={ "errors": [ { "errorCode": "invalid_response_type" } ] }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Oauthdetails request without ResponseType, uniqueIdentifier=TC_ESignet_OAuthDetailsRequest_45, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_OAuthDetailsRequest_Missing_Scope_Neg |
| Testcase Dependency |
| [TC_ESignet_CreateOIDCClient_01] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_OAuthDetailsRequest_Missing_Scope_Neg, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "$REMOVE$", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:static-code mosip:idp:acr:generated-code", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en" }, output={ "errors": [ { "errorCode": "invalid_scope" } ] }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Oauthdetails request without Scope, uniqueIdentifier=TC_ESignet_OAuthDetailsRequest_50, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_OAuthDetailsRequest_Missing_State_Pos |
| Testcase Dependency |
| [TC_ESignet_CreateOIDCClient_01] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_OAuthDetailsRequest_Missing_State_Pos, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:static-code mosip:idp:acr:generated-code", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "$REMOVE$", "claimsLocales": "en" }, output={ }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Oauthdetails request without state, uniqueIdentifier=TC_ESignet_OAuthDetailsRequest_72, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_OAuthDetailsRequest_Missing_claimsLocales_Pos |
| Testcase Dependency |
| [TC_ESignet_CreateOIDCClient_01] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_OAuthDetailsRequest_Missing_claimsLocales_Pos, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:static-code mosip:idp:acr:generated-code", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "$REMOVE$" }, output={ }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Oauthdetails request without claimsLocales, uniqueIdentifier=TC_ESignet_OAuthDetailsRequest_62, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_OAuthDetailsRequest_Missing_display_Pos |
| Testcase Dependency |
| [TC_ESignet_CreateOIDCClient_01] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_OAuthDetailsRequest_Missing_display_Pos, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "$REMOVE$", "prompt": "login", "acrValues": "mosip:idp:acr:static-code mosip:idp:acr:generated-code", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en" }, output={ }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Oauthdetails request without display, uniqueIdentifier=TC_ESignet_OAuthDetailsRequest_66, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_OAuthDetailsRequest_Missing_redirectUri_Neg |
| Testcase Dependency |
| [TC_ESignet_CreateOIDCClient_01] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_OAuthDetailsRequest_Missing_redirectUri_Neg, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$REMOVE$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:static-code mosip:idp:acr:generated-code", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en" }, output={ "errors": [ { "errorCode": "invalid_redirect_uri" } ] }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Oauthdetails request without redirectUri, uniqueIdentifier=TC_ESignet_OAuthDetailsRequest_41, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_OAuthDetailsRequest_Null_AcrValues_Pos |
| Testcase Dependency |
| [TC_ESignet_CreateOIDCClient_01] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_OAuthDetailsRequest_Null_AcrValues_Pos, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:static", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en" }, output={ }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Oauthdetails request with Null in AcrValues, uniqueIdentifier=TC_ESignet_OAuthDetailsRequest_58, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_OAuthDetailsRequest_Null_Prompt_Neg |
| Testcase Dependency |
| [TC_ESignet_CreateOIDCClient_01] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_OAuthDetailsRequest_Null_Prompt_Neg, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "null", "acrValues": "mosip:idp:acr:static-code mosip:idp:acr:generated-code", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en" }, output={ "errors": [ { "errorCode": "invalid_prompt" } ] }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Oauthdetails request with Null in prompt, uniqueIdentifier=TC_ESignet_OAuthDetailsRequest_85, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_OAuthDetailsRequest_Null_ResponseType_Neg |
| Testcase Dependency |
| [TC_ESignet_CreateOIDCClient_01] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_OAuthDetailsRequest_Null_ResponseType_Neg, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "decode", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:static-code mosip:idp:acr:generated-code", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en" }, output={ "errors": [ { "errorCode": "invalid_response_type" } ] }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Oauthdetails request with Null in ResponseType, uniqueIdentifier=TC_ESignet_OAuthDetailsRequest_47, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_OAuthDetailsRequest_Null_Scope_Neg |
| Testcase Dependency |
| [TC_ESignet_CreateOIDCClient_01] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_OAuthDetailsRequest_Null_Scope_Neg, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "null", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:static-code mosip:idp:acr:generated-code", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en" }, output={ "errors": [ { "errorCode": "invalid_scope" } ] }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Oauthdetails request with Null in Scope, uniqueIdentifier=TC_ESignet_OAuthDetailsRequest_52, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_OAuthDetailsRequest_Null_State_Pos |
| Testcase Dependency |
| [TC_ESignet_CreateOIDCClient_01] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_OAuthDetailsRequest_Null_State_Pos, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:static-code mosip:idp:acr:generated-code", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "null", "claimsLocales": "en" }, output={ }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Oauthdetails request with Null in state, uniqueIdentifier=TC_ESignet_OAuthDetailsRequest_74, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_OAuthDetailsRequest_Null_claimsLocales_Pos |
| Testcase Dependency |
| [TC_ESignet_CreateOIDCClient_01] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_OAuthDetailsRequest_Null_claimsLocales_Pos, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:static-code mosip:idp:acr:generated-code", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "null" }, output={ }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Oauthdetails request with Null in claimsLocales, uniqueIdentifier=TC_ESignet_OAuthDetailsRequest_65, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_OAuthDetailsRequest_Null_display_Neg |
| Testcase Dependency |
| [TC_ESignet_CreateOIDCClient_01] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_OAuthDetailsRequest_Null_display_Neg, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "null", "prompt": "login", "acrValues": "mosip:idp:acr:static-code mosip:idp:acr:generated-code", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en" }, output={ "errors": [ { "errorCode": "invalid_display" } ] }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Oauthdetails request with Null in display, uniqueIdentifier=TC_ESignet_OAuthDetailsRequest_69, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_OAuthDetailsRequest_Null_redirectUri_Neg |
| Testcase Dependency |
| [TC_ESignet_CreateOIDCClient_01] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_OAuthDetailsRequest_Null_redirectUri_Neg, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "null", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:static-code mosip:idp:acr:generated-code", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en" }, output={ "errors": [ { "errorCode": "invalid_redirect_uri" } ] }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Oauthdetails request with Null in redirectUri, uniqueIdentifier=TC_ESignet_OAuthDetailsRequest_43, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_OAuthDetailsRequest_Other_Valid_Smoke_sid |
| Testcase Dependency |
| [TC_ESignet_CreateOIDCClient_01] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_OAuthDetailsRequest_Other_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:biometrics mosip:idp:acr:generated-code", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en" }, output={ }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Oauthdetails request with other valid details, uniqueIdentifier=TC_ESignet_OAuthDetailsRequest_08, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_OAuthDetailsRequest_SpaceValue_display_Neg |
| Testcase Dependency |
| [TC_ESignet_CreateOIDCClient_01] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_OAuthDetailsRequest_SpaceValue_display_Neg, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": " ", "prompt": "login", "acrValues": "mosip:idp:acr:static-code mosip:idp:acr:generated-code", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en" }, output={ "errors": [ { "errorCode": "invalid_display" } ] }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Oauthdetails request with space in display, uniqueIdentifier=TC_ESignet_OAuthDetailsRequest_70, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_OAuthDetailsRequest_WithoutSpace_AcrValues_Pos |
| Testcase Dependency |
| [TC_ESignet_CreateOIDCClient_01] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_OAuthDetailsRequest_WithoutSpace_AcrValues_Pos, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:static-codemosip:idp:acr:generated-code", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en" }, output={ }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Oauthdetails request without space in AcrValues, uniqueIdentifier=TC_ESignet_OAuthDetailsRequest_55, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_OAuthDetailsRequest_WithoutSpace_Scope_Neg |
| Testcase Dependency |
| [TC_ESignet_CreateOIDCClient_01] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_OAuthDetailsRequest_WithoutSpace_Scope_Neg, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openidemailaddressphone", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:static-code mosip:idp:acr:generated-code", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en" }, output={ "errors": [ { "errorCode": "invalid_scope" } ] }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Oauthdetails request without space in Scope, uniqueIdentifier=TC_ESignet_OAuthDetailsRequest_49, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_OAuthDetailsRequest_all_Valid_Smoke_sid |
| Testcase Dependency |
| [TC_ESignet_CreateOIDCClient_01] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_OAuthDetailsRequest_all_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:generated-code", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en" }, output={ }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Oauthdetails request with all valid details, uniqueIdentifier=TC_ESignet_OAuthDetailsRequest_01, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_OAuthDetailsRequest_all_Valid_for_authCode_onlyOptionalClaim_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_OAuthDetailsRequest_all_Valid_for_authCode_onlyOptionalClaim_sid, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:generated-code", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en" }, output={ }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestOptionalClaim, outputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Oauthdetails request with all valid details, uniqueIdentifier=TC_ESignet_OAuthDetailsRequest_88, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_OAuthDetailsRequest_all_Valid_for_authCode_onlyOptionalClaim_user2_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_OAuthDetailsRequest_all_Valid_for_authCode_onlyOptionalClaim_user2_sid, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:generated-code", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en" }, output={ }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestOptionalClaim, outputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Oauthdetails request with all valid details, uniqueIdentifier=TC_ESignet_OAuthDetailsRequest_89, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_OAuthDetailsRequest_all_Valid_for_authCode_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_OAuthDetailsRequest_all_Valid_for_authCode_sid, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:generated-code", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en" }, output={ }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Oauthdetails request with all valid details, uniqueIdentifier=TC_ESignet_OAuthDetailsRequest_87, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_OAuthDetailsRequest_space_delimited_Prompt_Neg |
| Testcase Dependency |
| [TC_ESignet_CreateOIDCClient_01] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_OAuthDetailsRequest_space_delimited_Prompt_Neg, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "select account", "acrValues": "mosip:idp:acr:static-code mosip:idp:acr:generated-code", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en" }, output={ "errors": [ { "errorCode": "invalid_prompt" } ] }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Oauthdetails request with space delimited in prompt, uniqueIdentifier=TC_ESignet_OAuthDetailsRequest_86, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_OAuthDetailsRequest_vid_Other_Valid_Smoke_sid |
| Testcase Dependency |
| [TC_ESignet_CreateOIDCClient_01] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_OAuthDetailsRequest_vid_Other_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "scope": "openid resident-service profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:biometrics mosip:idp:acr:generated-code", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en" }, output={ }, inputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=esignet/OAuthDetailsRequest/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Oauthdetails request with other valid details VID, uniqueIdentifier=TC_ESignet_OAuthDetailsRequest_09, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_BioAuth_Biometric_Face_With_Valid_Vid_Smoke_Pos |
| Testcase Dependency |
| [] |
| Class Name |
| EsignetBioAuth |
| Testcase Input |
| testCaseName=ESignet_BioAuth_Biometric_Face_With_Valid_Vid_Smoke_Pos, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_14all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_14all_Valid_Smoke_sid_transactionId$", "individualId": "$ID:Generate_Perpetual2_VID_Valid_Smoke_sid_vid$", "authFactorType" : "BIO", "challenge" : "$CHALLENGE$", "identityRequest":{ "bioSubType": "UNKNOWN", "bioType": "FACE", "bioValue": "$FACE$", "deviceCode": "bc0b6848-6d45-46d1-a9bd-b334410bf823", "dateTime": "$DATETIME$", "deviceProviderID": "1873299273", "deviceServiceID": "", "deviceServiceVersion": "SB.WIN.001", "deviceProvider": "SYNCBYTE", "deviceProviderId": "SYNCBYTE.LTC165", "deviceSubType": "Full face", "make": "Logitech", "model": "4d36e96c-e325-11ce-bfc1-08002be10318", "serialNo": "78467171", "type": "Face", "transactionId": "$ID:OAuthDetailsRequest_14all_Valid_Smoke_sid_transactionId$", "identityRequestTemplate": "esignet/BioAuthIdp/BioAuthIdentityEncrypt", "identityRequestEncUrl": "/idauthentication/v1/internal/encrypt" } }, output={ }, inputTemplate=esignet/BioAuthIdp/bioAuth, outputTemplate=esignet/BioAuthIdp/bioAuthResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Biometric Face Auth with all valid details VID, uniqueIdentifier=TC_ESignet_BioAuth_13, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:210)
at io.mosip.testrig.apirig.esignet.testscripts.EsignetBioAuth.test(EsignetBioAuth.java:90)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_BioAuth_Biometric_Face_With_Valid_uin_Smoke_Pos |
| Testcase Dependency |
| [] |
| Class Name |
| EsignetBioAuth |
| Testcase Input |
| testCaseName=ESignet_BioAuth_Biometric_Face_With_Valid_uin_Smoke_Pos, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_13all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_13all_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_BioAuth_smoke_Pos_UIN$", "authFactorType" : "BIO", "challenge" : "$CHALLENGE$", "identityRequest":{ "bioSubType": "UNKNOWN", "bioType": "FACE", "bioValue": "$FACE$", "deviceCode": "bc0b6848-6d45-46d1-a9bd-b334410bf823", "dateTime": "$DATETIME$", "deviceProviderID": "1873299273", "deviceServiceID": "", "deviceServiceVersion": "SB.WIN.001", "deviceProvider": "SYNCBYTE", "deviceProviderId": "SYNCBYTE.LTC165", "deviceSubType": "Full face", "make": "Logitech", "model": "4d36e96c-e325-11ce-bfc1-08002be10318", "serialNo": "78467171", "type": "Face", "transactionId": "$ID:OAuthDetailsRequest_13all_Valid_Smoke_sid_transactionId$", "identityRequestTemplate": "esignet/BioAuthIdp/BioAuthIdentityEncrypt", "identityRequestEncUrl": "/idauthentication/v1/internal/encrypt" } }, output={ }, inputTemplate=esignet/BioAuthIdp/bioAuth, outputTemplate=esignet/BioAuthIdp/bioAuthResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Biometric Face Auth with all valid details UIN, uniqueIdentifier=TC_ESignet_BioAuth_01, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:210)
at io.mosip.testrig.apirig.esignet.testscripts.EsignetBioAuth.test(EsignetBioAuth.java:90)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_BioAuth_Biometric_LeftIris_With_Valid_Vid_Smoke_Pos |
| Testcase Dependency |
| [] |
| Class Name |
| EsignetBioAuth |
| Testcase Input |
| testCaseName=ESignet_BioAuth_Biometric_LeftIris_With_Valid_Vid_Smoke_Pos, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_25all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_25all_Valid_Smoke_sid_transactionId$", "individualId": "$ID:Generate_Perpetual2_VID_Valid_Smoke_sid_vid$", "authFactorType" : "BIO", "challenge" : "$CHALLENGE$", "identityRequest":{ "bioSubType": "Left", "bioType": "Iris", "bioValue": "$LEFTIRIS$", "deviceCode": "bc0b6848-6d45-46d1-a9bd-b334410bf823", "dateTime": "$DATETIME$", "deviceProviderID": "SYNCBYTE.MC01A", "deviceServiceID": "", "deviceServiceVersion": "SB.WIN.001", "deviceProvider": "SYNCBYTE", "deviceProviderId": "SYNCBYTE.LTC165", "deviceSubType": "Slap", "make": "Logitech", "model": "4d36e96c-e325-11ce-bfc1-08002be10318", "serialNo": "78467175", "type": "Iris", "transactionId": "$ID:OAuthDetailsRequest_25all_Valid_Smoke_sid_transactionId$", "identityRequestTemplate": "esignet/BioAuthIdp/BioAuthIdentityEncrypt", "identityRequestEncUrl": "/idauthentication/v1/internal/encrypt" } }, output={ }, inputTemplate=esignet/BioAuthIdp/bioAuth, outputTemplate=esignet/BioAuthIdp/bioAuthResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Biometric LeftIris Auth with all valid details VID, uniqueIdentifier=TC_ESignet_BioAuth_24, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:210)
at io.mosip.testrig.apirig.esignet.testscripts.EsignetBioAuth.test(EsignetBioAuth.java:90)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_BioAuth_Biometric_LeftIris_With_Valid_uin_Smoke_Pos |
| Testcase Dependency |
| [] |
| Class Name |
| EsignetBioAuth |
| Testcase Input |
| testCaseName=ESignet_BioAuth_Biometric_LeftIris_With_Valid_uin_Smoke_Pos, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_12all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_12all_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_BioAuth_smoke_Pos_UIN$", "authFactorType" : "BIO", "challenge" : "$CHALLENGE$", "identityRequest":{ "bioSubType": "Left", "bioType": "Iris", "bioValue": "$LEFTIRIS$", "deviceCode": "bc0b6848-6d45-46d1-a9bd-b334410bf823", "dateTime": "$DATETIME$", "deviceProviderID": "SYNCBYTE.MC01A", "deviceServiceID": "", "deviceServiceVersion": "SB.WIN.001", "deviceProvider": "SYNCBYTE", "deviceProviderId": "SYNCBYTE.LTC165", "deviceSubType": "Slap", "make": "Logitech", "model": "4d36e96c-e325-11ce-bfc1-08002be10318", "serialNo": "78467175", "type": "Iris", "transactionId": "$ID:OAuthDetailsRequest_12all_Valid_Smoke_sid_transactionId$", "identityRequestTemplate": "esignet/BioAuthIdp/BioAuthIdentityEncrypt", "identityRequestEncUrl": "/idauthentication/v1/internal/encrypt" } }, output={ }, inputTemplate=esignet/BioAuthIdp/bioAuth, outputTemplate=esignet/BioAuthIdp/bioAuthResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Biometric LeftIris Auth with all valid details UIN, uniqueIdentifier=TC_ESignet_BioAuth_12, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:210)
at io.mosip.testrig.apirig.esignet.testscripts.EsignetBioAuth.test(EsignetBioAuth.java:90)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_BioAuth_Biometric_LeftLittleFinger_With_Valid_Vid_Smoke_Pos |
| Testcase Dependency |
| [] |
| Class Name |
| EsignetBioAuth |
| Testcase Input |
| testCaseName=ESignet_BioAuth_Biometric_LeftLittleFinger_With_Valid_Vid_Smoke_Pos, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_17all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_17all_Valid_Smoke_sid_transactionId$", "individualId": "$ID:Generate_Perpetual2_VID_Valid_Smoke_sid_vid$", "authFactorType" : "BIO", "challenge" : "$CHALLENGE$", "identityRequest":{ "bioSubType": "Left LittleFinger", "bioType": "Finger", "bioValue": "$LEFTLITTLEFINGER$", "deviceCode": "bc0b6848-6d45-46d1-a9bd-b334410bf823", "dateTime": "$DATETIME$", "deviceProviderID": "SYNCBYTE.MC01A", "deviceServiceID": "", "deviceServiceVersion": "SB.WIN.001", "deviceProvider": "SYNCBYTE", "deviceProviderId": "SYNCBYTE.LTC165", "deviceSubType": "Slap", "make": "Logitech", "model": "4d36e96c-e325-11ce-bfc1-08002be10318", "serialNo": "78467175", "type": "Finger", "transactionId": "$ID:OAuthDetailsRequest_17all_Valid_Smoke_sid_transactionId$", "identityRequestTemplate": "esignet/BioAuthIdp/BioAuthIdentityEncrypt", "identityRequestEncUrl": "/idauthentication/v1/internal/encrypt" } }, output={ }, inputTemplate=esignet/BioAuthIdp/bioAuth, outputTemplate=esignet/BioAuthIdp/bioAuthResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Biometric LeftLittleFinger Auth with all valid details VID, uniqueIdentifier=TC_ESignet_BioAuth_16, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:210)
at io.mosip.testrig.apirig.esignet.testscripts.EsignetBioAuth.test(EsignetBioAuth.java:90)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_BioAuth_Biometric_LeftLittleFinger_With_Valid_uin_Smoke_Pos |
| Testcase Dependency |
| [] |
| Class Name |
| EsignetBioAuth |
| Testcase Input |
| testCaseName=ESignet_BioAuth_Biometric_LeftLittleFinger_With_Valid_uin_Smoke_Pos, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_4all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_4all_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_BioAuth_smoke_Pos_UIN$", "authFactorType" : "BIO", "challenge" : "$CHALLENGE$", "identityRequest":{ "bioSubType": "Left LittleFinger", "bioType": "Finger", "bioValue": "$LEFTLITTLEFINGER$", "deviceCode": "bc0b6848-6d45-46d1-a9bd-b334410bf823", "dateTime": "$DATETIME$", "deviceProviderID": "SYNCBYTE.MC01A", "deviceServiceID": "", "deviceServiceVersion": "SB.WIN.001", "deviceProvider": "SYNCBYTE", "deviceProviderId": "SYNCBYTE.LTC165", "deviceSubType": "Slap", "make": "Logitech", "model": "4d36e96c-e325-11ce-bfc1-08002be10318", "serialNo": "78467175", "type": "Finger", "transactionId": "$ID:OAuthDetailsRequest_4all_Valid_Smoke_sid_transactionId$", "identityRequestTemplate": "esignet/BioAuthIdp/BioAuthIdentityEncrypt", "identityRequestEncUrl": "/idauthentication/v1/internal/encrypt" } }, output={ }, inputTemplate=esignet/BioAuthIdp/bioAuth, outputTemplate=esignet/BioAuthIdp/bioAuthResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Biometric LeftLittleFinger Auth with all valid details UIN, uniqueIdentifier=TC_ESignet_BioAuth_04, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:210)
at io.mosip.testrig.apirig.esignet.testscripts.EsignetBioAuth.test(EsignetBioAuth.java:90)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_BioAuth_Biometric_LeftMiddleFingerr_With_Valid_Vid_Smoke_Pos |
| Testcase Dependency |
| [] |
| Class Name |
| EsignetBioAuth |
| Testcase Input |
| testCaseName=ESignet_BioAuth_Biometric_LeftMiddleFingerr_With_Valid_Vid_Smoke_Pos, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_16all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_16all_Valid_Smoke_sid_transactionId$", "individualId": "$ID:Generate_Perpetual2_VID_Valid_Smoke_sid_vid$", "authFactorType" : "BIO", "challenge" : "$CHALLENGE$", "identityRequest":{ "bioSubType": "Left MiddleFinger", "bioType": "Finger", "bioValue": "$LEFTMIDDLEFINGER$", "deviceCode": "bc0b6848-6d45-46d1-a9bd-b334410bf823", "dateTime": "$DATETIME$", "deviceProviderID": "SYNCBYTE.MC01A", "deviceServiceID": "", "deviceServiceVersion": "SB.WIN.001", "deviceProvider": "SYNCBYTE", "deviceProviderId": "SYNCBYTE.LTC165", "deviceSubType": "Slap", "make": "Logitech", "model": "4d36e96c-e325-11ce-bfc1-08002be10318", "serialNo": "78467175", "type": "Finger", "transactionId": "$ID:OAuthDetailsRequest_16all_Valid_Smoke_sid_transactionId$", "identityRequestTemplate": "esignet/BioAuthIdp/BioAuthIdentityEncrypt", "identityRequestEncUrl": "/idauthentication/v1/internal/encrypt" } }, output={ }, inputTemplate=esignet/BioAuthIdp/bioAuth, outputTemplate=esignet/BioAuthIdp/bioAuthResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Biometric LeftMiddleFinger Auth with all valid details VID, uniqueIdentifier=TC_ESignet_BioAuth_15, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:210)
at io.mosip.testrig.apirig.esignet.testscripts.EsignetBioAuth.test(EsignetBioAuth.java:90)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_BioAuth_Biometric_LeftMiddleFingerr_With_Valid_uin_Smoke_Pos |
| Testcase Dependency |
| [] |
| Class Name |
| EsignetBioAuth |
| Testcase Input |
| testCaseName=ESignet_BioAuth_Biometric_LeftMiddleFingerr_With_Valid_uin_Smoke_Pos, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_3all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_3all_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_BioAuth_smoke_Pos_UIN$", "authFactorType" : "BIO", "challenge" : "$CHALLENGE$", "identityRequest":{ "bioSubType": "Left MiddleFinger", "bioType": "Finger", "bioValue": "$LEFTMIDDLEFINGER$", "deviceCode": "bc0b6848-6d45-46d1-a9bd-b334410bf823", "dateTime": "$DATETIME$", "deviceProviderID": "SYNCBYTE.MC01A", "deviceServiceID": "", "deviceServiceVersion": "SB.WIN.001", "deviceProvider": "SYNCBYTE", "deviceProviderId": "SYNCBYTE.LTC165", "deviceSubType": "Slap", "make": "Logitech", "model": "4d36e96c-e325-11ce-bfc1-08002be10318", "serialNo": "78467175", "type": "Finger", "transactionId": "$ID:OAuthDetailsRequest_3all_Valid_Smoke_sid_transactionId$", "identityRequestTemplate": "esignet/BioAuthIdp/BioAuthIdentityEncrypt", "identityRequestEncUrl": "/idauthentication/v1/internal/encrypt" } }, output={ }, inputTemplate=esignet/BioAuthIdp/bioAuth, outputTemplate=esignet/BioAuthIdp/bioAuthResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Biometric LeftMiddleFinger Auth with all valid details UIN, uniqueIdentifier=TC_ESignet_BioAuth_03, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:210)
at io.mosip.testrig.apirig.esignet.testscripts.EsignetBioAuth.test(EsignetBioAuth.java:90)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_BioAuth_Biometric_LeftThumb_With_Valid_Vid_Smoke_Pos |
| Testcase Dependency |
| [] |
| Class Name |
| EsignetBioAuth |
| Testcase Input |
| testCaseName=ESignet_BioAuth_Biometric_LeftThumb_With_Valid_Vid_Smoke_Pos, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_22all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_22all_Valid_Smoke_sid_transactionId$", "individualId": "$ID:Generate_Perpetual2_VID_Valid_Smoke_sid_vid$", "authFactorType" : "BIO", "challenge" : "$CHALLENGE$", "identityRequest":{ "bioSubType": "Left Thumb", "bioType": "Finger", "bioValue": "$LEFTTHUMB$", "deviceCode": "bc0b6848-6d45-46d1-a9bd-b334410bf823", "dateTime": "$DATETIME$", "deviceProviderID": "SYNCBYTE.MC01A", "deviceServiceID": "", "deviceServiceVersion": "SB.WIN.001", "deviceProvider": "SYNCBYTE", "deviceProviderId": "SYNCBYTE.LTC165", "deviceSubType": "Slap", "make": "Logitech", "model": "4d36e96c-e325-11ce-bfc1-08002be10318", "serialNo": "78467175", "type": "Finger", "transactionId": "$ID:OAuthDetailsRequest_22all_Valid_Smoke_sid_transactionId$", "identityRequestTemplate": "esignet/BioAuthIdp/BioAuthIdentityEncrypt", "identityRequestEncUrl": "/idauthentication/v1/internal/encrypt" } }, output={ }, inputTemplate=esignet/BioAuthIdp/bioAuth, outputTemplate=esignet/BioAuthIdp/bioAuthResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Biometric LeftThumb Auth with all valid details VID, uniqueIdentifier=TC_ESignet_BioAuth_21, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:210)
at io.mosip.testrig.apirig.esignet.testscripts.EsignetBioAuth.test(EsignetBioAuth.java:90)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_BioAuth_Biometric_LeftThumb_With_Valid_uin_Smoke_Pos |
| Testcase Dependency |
| [] |
| Class Name |
| EsignetBioAuth |
| Testcase Input |
| testCaseName=ESignet_BioAuth_Biometric_LeftThumb_With_Valid_uin_Smoke_Pos, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_9all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_9all_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_BioAuth_smoke_Pos_UIN$", "authFactorType" : "BIO", "challenge" : "$CHALLENGE$", "identityRequest":{ "bioSubType": "Left Thumb", "bioType": "Finger", "bioValue": "$LEFTTHUMB$", "deviceCode": "bc0b6848-6d45-46d1-a9bd-b334410bf823", "dateTime": "$DATETIME$", "deviceProviderID": "SYNCBYTE.MC01A", "deviceServiceID": "", "deviceServiceVersion": "SB.WIN.001", "deviceProvider": "SYNCBYTE", "deviceProviderId": "SYNCBYTE.LTC165", "deviceSubType": "Slap", "make": "Logitech", "model": "4d36e96c-e325-11ce-bfc1-08002be10318", "serialNo": "78467175", "type": "Finger", "transactionId": "$ID:OAuthDetailsRequest_9all_Valid_Smoke_sid_transactionId$", "identityRequestTemplate": "esignet/BioAuthIdp/BioAuthIdentityEncrypt", "identityRequestEncUrl": "/idauthentication/v1/internal/encrypt" } }, output={ }, inputTemplate=esignet/BioAuthIdp/bioAuth, outputTemplate=esignet/BioAuthIdp/bioAuthResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Biometric LeftThumb Auth with all valid details UIN, uniqueIdentifier=TC_ESignet_BioAuth_09, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:210)
at io.mosip.testrig.apirig.esignet.testscripts.EsignetBioAuth.test(EsignetBioAuth.java:90)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_BioAuth_Biometric_RightIndexFinger_With_Valid_Vid_Smoke_Pos |
| Testcase Dependency |
| [] |
| Class Name |
| EsignetBioAuth |
| Testcase Input |
| testCaseName=ESignet_BioAuth_Biometric_RightIndexFinger_With_Valid_Vid_Smoke_Pos, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_18all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_18all_Valid_Smoke_sid_transactionId$", "individualId": "$ID:Generate_Perpetual2_VID_Valid_Smoke_sid_vid$", "authFactorType" : "BIO", "challenge" : "$CHALLENGE$", "identityRequest":{ "bioSubType": "Right IndexFinger", "bioType": "Finger", "bioValue": "$RIGHTINDEXFINGER$", "deviceCode": "bc0b6848-6d45-46d1-a9bd-b334410bf823", "dateTime": "$DATETIME$", "deviceProviderID": "SYNCBYTE.MC01A", "deviceServiceID": "", "deviceServiceVersion": "SB.WIN.001", "deviceProvider": "SYNCBYTE", "deviceProviderId": "SYNCBYTE.LTC165", "deviceSubType": "Slap", "make": "Logitech", "model": "4d36e96c-e325-11ce-bfc1-08002be10318", "serialNo": "78467175", "type": "Finger", "transactionId": "$ID:OAuthDetailsRequest_18all_Valid_Smoke_sid_transactionId$", "identityRequestTemplate": "esignet/BioAuthIdp/BioAuthIdentityEncrypt", "identityRequestEncUrl": "/idauthentication/v1/internal/encrypt" } }, output={ }, inputTemplate=esignet/BioAuthIdp/bioAuth, outputTemplate=esignet/BioAuthIdp/bioAuthResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Biometric RightIndexFinger Auth with all valid details VID, uniqueIdentifier=TC_ESignet_BioAuth_17, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:210)
at io.mosip.testrig.apirig.esignet.testscripts.EsignetBioAuth.test(EsignetBioAuth.java:90)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_BioAuth_Biometric_RightIndexFinger_With_Valid_uin_Smoke_Pos |
| Testcase Dependency |
| [] |
| Class Name |
| EsignetBioAuth |
| Testcase Input |
| testCaseName=ESignet_BioAuth_Biometric_RightIndexFinger_With_Valid_uin_Smoke_Pos, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_5all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_5all_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_BioAuth_smoke_Pos_UIN$", "authFactorType" : "BIO", "challenge" : "$CHALLENGE$", "identityRequest":{ "bioSubType": "Right IndexFinger", "bioType": "Finger", "bioValue": "$RIGHTINDEXFINGER$", "deviceCode": "bc0b6848-6d45-46d1-a9bd-b334410bf823", "dateTime": "$DATETIME$", "deviceProviderID": "SYNCBYTE.MC01A", "deviceServiceID": "", "deviceServiceVersion": "SB.WIN.001", "deviceProvider": "SYNCBYTE", "deviceProviderId": "SYNCBYTE.LTC165", "deviceSubType": "Slap", "make": "Logitech", "model": "4d36e96c-e325-11ce-bfc1-08002be10318", "serialNo": "78467175", "type": "Finger", "transactionId": "$ID:OAuthDetailsRequest_5all_Valid_Smoke_sid_transactionId$", "identityRequestTemplate": "esignet/BioAuthIdp/BioAuthIdentityEncrypt", "identityRequestEncUrl": "/idauthentication/v1/internal/encrypt" } }, output={ }, inputTemplate=esignet/BioAuthIdp/bioAuth, outputTemplate=esignet/BioAuthIdp/bioAuthResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Biometric RightIndexFinger Auth with all valid details UIN, uniqueIdentifier=TC_ESignet_BioAuth_05, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:210)
at io.mosip.testrig.apirig.esignet.testscripts.EsignetBioAuth.test(EsignetBioAuth.java:90)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_BioAuth_Biometric_RightIris_With_Valid_Vid_Smoke_Pos |
| Testcase Dependency |
| [] |
| Class Name |
| EsignetBioAuth |
| Testcase Input |
| testCaseName=ESignet_BioAuth_Biometric_RightIris_With_Valid_Vid_Smoke_Pos, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_24all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_24all_Valid_Smoke_sid_transactionId$", "individualId": "$ID:Generate_Perpetual2_VID_Valid_Smoke_sid_vid$", "authFactorType" : "BIO", "challenge" : "$CHALLENGE$", "identityRequest":{ "bioSubType": "Right", "bioType": "Iris", "bioValue": "$RIGHTIRIS$", "deviceCode": "bc0b6848-6d45-46d1-a9bd-b334410bf823", "dateTime": "$DATETIME$", "deviceProviderID": "SYNCBYTE.MC01A", "deviceServiceID": "", "deviceServiceVersion": "SB.WIN.001", "deviceProvider": "SYNCBYTE", "deviceProviderId": "SYNCBYTE.LTC165", "deviceSubType": "Slap", "make": "Logitech", "model": "4d36e96c-e325-11ce-bfc1-08002be10318", "serialNo": "78467175", "type": "Iris", "transactionId": "$ID:OAuthDetailsRequest_24all_Valid_Smoke_sid_transactionId$", "identityRequestTemplate": "esignet/BioAuthIdp/BioAuthIdentityEncrypt", "identityRequestEncUrl": "/idauthentication/v1/internal/encrypt" } }, output={ }, inputTemplate=esignet/BioAuthIdp/bioAuth, outputTemplate=esignet/BioAuthIdp/bioAuthResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Biometric RightIris Auth with all valid details VID, uniqueIdentifier=TC_ESignet_BioAuth_23, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:210)
at io.mosip.testrig.apirig.esignet.testscripts.EsignetBioAuth.test(EsignetBioAuth.java:90)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_BioAuth_Biometric_RightIris_With_Valid_uin_Smoke_Pos |
| Testcase Dependency |
| [] |
| Class Name |
| EsignetBioAuth |
| Testcase Input |
| testCaseName=ESignet_BioAuth_Biometric_RightIris_With_Valid_uin_Smoke_Pos, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_11all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_11all_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_BioAuth_smoke_Pos_UIN$", "authFactorType" : "BIO", "challenge" : "$CHALLENGE$", "identityRequest":{ "bioSubType": "Right", "bioType": "Iris", "bioValue": "$RIGHTIRIS$", "deviceCode": "bc0b6848-6d45-46d1-a9bd-b334410bf823", "dateTime": "$DATETIME$", "deviceProviderID": "SYNCBYTE.MC01A", "deviceServiceID": "", "deviceServiceVersion": "SB.WIN.001", "deviceProvider": "SYNCBYTE", "deviceProviderId": "SYNCBYTE.LTC165", "deviceSubType": "Slap", "make": "Logitech", "model": "4d36e96c-e325-11ce-bfc1-08002be10318", "serialNo": "78467175", "type": "Iris", "transactionId": "$ID:OAuthDetailsRequest_11all_Valid_Smoke_sid_transactionId$", "identityRequestTemplate": "esignet/BioAuthIdp/BioAuthIdentityEncrypt", "identityRequestEncUrl": "/idauthentication/v1/internal/encrypt" } }, output={ }, inputTemplate=esignet/BioAuthIdp/bioAuth, outputTemplate=esignet/BioAuthIdp/bioAuthResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Biometric RightIris Auth with all valid details UIN, uniqueIdentifier=TC_ESignet_BioAuth_11, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:210)
at io.mosip.testrig.apirig.esignet.testscripts.EsignetBioAuth.test(EsignetBioAuth.java:90)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_BioAuth_Biometric_RightLittleFinger_With_Valid_Vid_Smoke_Pos |
| Testcase Dependency |
| [] |
| Class Name |
| EsignetBioAuth |
| Testcase Input |
| testCaseName=ESignet_BioAuth_Biometric_RightLittleFinger_With_Valid_Vid_Smoke_Pos, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_21all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_21all_Valid_Smoke_sid_transactionId$", "individualId": "$ID:Generate_Perpetual2_VID_Valid_Smoke_sid_vid$", "authFactorType" : "BIO", "challenge" : "$CHALLENGE$", "identityRequest":{ "bioSubType": "Right LittleFinger", "bioType": "Finger", "bioValue": "$RIGHTLITTLEFINGER$", "deviceCode": "bc0b6848-6d45-46d1-a9bd-b334410bf823", "dateTime": "$DATETIME$", "deviceProviderID": "SYNCBYTE.MC01A", "deviceServiceID": "", "deviceServiceVersion": "SB.WIN.001", "deviceProvider": "SYNCBYTE", "deviceProviderId": "SYNCBYTE.LTC165", "deviceSubType": "Slap", "make": "Logitech", "model": "4d36e96c-e325-11ce-bfc1-08002be10318", "serialNo": "78467175", "type": "Finger", "transactionId": "$ID:OAuthDetailsRequest_21all_Valid_Smoke_sid_transactionId$", "identityRequestTemplate": "esignet/BioAuthIdp/BioAuthIdentityEncrypt", "identityRequestEncUrl": "/idauthentication/v1/internal/encrypt" } }, output={ }, inputTemplate=esignet/BioAuthIdp/bioAuth, outputTemplate=esignet/BioAuthIdp/bioAuthResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Biometric RightLittleFinger Auth with all valid details VID, uniqueIdentifier=TC_ESignet_BioAuth_20, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:210)
at io.mosip.testrig.apirig.esignet.testscripts.EsignetBioAuth.test(EsignetBioAuth.java:90)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_BioAuth_Biometric_RightLittleFinger_With_Valid_uin_Smoke_Pos |
| Testcase Dependency |
| [] |
| Class Name |
| EsignetBioAuth |
| Testcase Input |
| testCaseName=ESignet_BioAuth_Biometric_RightLittleFinger_With_Valid_uin_Smoke_Pos, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_8all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_8all_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_BioAuth_smoke_Pos_UIN$", "authFactorType" : "BIO", "challenge" : "$CHALLENGE$", "identityRequest":{ "bioSubType": "Right LittleFinger", "bioType": "Finger", "bioValue": "$RIGHTLITTLEFINGER$", "deviceCode": "bc0b6848-6d45-46d1-a9bd-b334410bf823", "dateTime": "$DATETIME$", "deviceProviderID": "SYNCBYTE.MC01A", "deviceServiceID": "", "deviceServiceVersion": "SB.WIN.001", "deviceProvider": "SYNCBYTE", "deviceProviderId": "SYNCBYTE.LTC165", "deviceSubType": "Slap", "make": "Logitech", "model": "4d36e96c-e325-11ce-bfc1-08002be10318", "serialNo": "78467175", "type": "Finger", "transactionId": "$ID:OAuthDetailsRequest_8all_Valid_Smoke_sid_transactionId$", "identityRequestTemplate": "esignet/BioAuthIdp/BioAuthIdentityEncrypt", "identityRequestEncUrl": "/idauthentication/v1/internal/encrypt" } }, output={ }, inputTemplate=esignet/BioAuthIdp/bioAuth, outputTemplate=esignet/BioAuthIdp/bioAuthResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Biometric RightLittleFinger Auth with all valid details UIN, uniqueIdentifier=TC_ESignet_BioAuth_08, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:210)
at io.mosip.testrig.apirig.esignet.testscripts.EsignetBioAuth.test(EsignetBioAuth.java:90)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_BioAuth_Biometric_RightMiddleFinger_With_Valid_Vid_Smoke_Pos |
| Testcase Dependency |
| [] |
| Class Name |
| EsignetBioAuth |
| Testcase Input |
| testCaseName=ESignet_BioAuth_Biometric_RightMiddleFinger_With_Valid_Vid_Smoke_Pos, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_20all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_20all_Valid_Smoke_sid_transactionId$", "individualId": "$ID:Generate_Perpetual2_VID_Valid_Smoke_sid_vid$", "authFactorType" : "BIO", "challenge" : "$CHALLENGE$", "identityRequest":{ "bioSubType": "Right MiddleFinger", "bioType": "Finger", "bioValue": "$RIGHTMIDDLEFINGER$", "deviceCode": "bc0b6848-6d45-46d1-a9bd-b334410bf823", "dateTime": "$DATETIME$", "deviceProviderID": "SYNCBYTE.MC01A", "deviceServiceID": "", "deviceServiceVersion": "SB.WIN.001", "deviceProvider": "SYNCBYTE", "deviceProviderId": "SYNCBYTE.LTC165", "deviceSubType": "Slap", "make": "Logitech", "model": "4d36e96c-e325-11ce-bfc1-08002be10318", "serialNo": "78467175", "type": "Finger", "transactionId": "$ID:OAuthDetailsRequest_20all_Valid_Smoke_sid_transactionId$", "identityRequestTemplate": "esignet/BioAuthIdp/BioAuthIdentityEncrypt", "identityRequestEncUrl": "/idauthentication/v1/internal/encrypt" } }, output={ }, inputTemplate=esignet/BioAuthIdp/bioAuth, outputTemplate=esignet/BioAuthIdp/bioAuthResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Biometric RightMiddleFinger Auth with all valid details VID, uniqueIdentifier=TC_ESignet_BioAuth_19, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:210)
at io.mosip.testrig.apirig.esignet.testscripts.EsignetBioAuth.test(EsignetBioAuth.java:90)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_BioAuth_Biometric_RightMiddleFinger_With_Valid_uin_Smoke_Pos |
| Testcase Dependency |
| [] |
| Class Name |
| EsignetBioAuth |
| Testcase Input |
| testCaseName=ESignet_BioAuth_Biometric_RightMiddleFinger_With_Valid_uin_Smoke_Pos, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_7all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_7all_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_BioAuth_smoke_Pos_UIN$", "authFactorType" : "BIO", "challenge" : "$CHALLENGE$", "identityRequest":{ "bioSubType": "Right MiddleFinger", "bioType": "Finger", "bioValue": "$RIGHTMIDDLEFINGER$", "deviceCode": "bc0b6848-6d45-46d1-a9bd-b334410bf823", "dateTime": "$DATETIME$", "deviceProviderID": "SYNCBYTE.MC01A", "deviceServiceID": "", "deviceServiceVersion": "SB.WIN.001", "deviceProvider": "SYNCBYTE", "deviceProviderId": "SYNCBYTE.LTC165", "deviceSubType": "Slap", "make": "Logitech", "model": "4d36e96c-e325-11ce-bfc1-08002be10318", "serialNo": "78467175", "type": "Finger", "transactionId": "$ID:OAuthDetailsRequest_7all_Valid_Smoke_sid_transactionId$", "identityRequestTemplate": "esignet/BioAuthIdp/BioAuthIdentityEncrypt", "identityRequestEncUrl": "/idauthentication/v1/internal/encrypt" } }, output={ }, inputTemplate=esignet/BioAuthIdp/bioAuth, outputTemplate=esignet/BioAuthIdp/bioAuthResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Biometric RightMiddleFinger Auth with all valid details UIN, uniqueIdentifier=TC_ESignet_BioAuth_07, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:210)
at io.mosip.testrig.apirig.esignet.testscripts.EsignetBioAuth.test(EsignetBioAuth.java:90)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_BioAuth_Biometric_RightRingFinger_With_Valid_Vid_Smoke_Pos |
| Testcase Dependency |
| [] |
| Class Name |
| EsignetBioAuth |
| Testcase Input |
| testCaseName=ESignet_BioAuth_Biometric_RightRingFinger_With_Valid_Vid_Smoke_Pos, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_19all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_19all_Valid_Smoke_sid_transactionId$", "individualId": "$ID:Generate_Perpetual2_VID_Valid_Smoke_sid_vid$", "authFactorType" : "BIO", "challenge" : "$CHALLENGE$", "identityRequest":{ "bioSubType": "Right RingFinger", "bioType": "Finger", "bioValue": "$RIGHTRINGFINGER$", "deviceCode": "bc0b6848-6d45-46d1-a9bd-b334410bf823", "dateTime": "$DATETIME$", "deviceProviderID": "SYNCBYTE.MC01A", "deviceServiceID": "", "deviceServiceVersion": "SB.WIN.001", "deviceProvider": "SYNCBYTE", "deviceProviderId": "SYNCBYTE.LTC165", "deviceSubType": "Slap", "make": "Logitech", "model": "4d36e96c-e325-11ce-bfc1-08002be10318", "serialNo": "78467175", "type": "Finger", "transactionId": "$ID:OAuthDetailsRequest_19all_Valid_Smoke_sid_transactionId$", "identityRequestTemplate": "esignet/BioAuthIdp/BioAuthIdentityEncrypt", "identityRequestEncUrl": "/idauthentication/v1/internal/encrypt" } }, output={ }, inputTemplate=esignet/BioAuthIdp/bioAuth, outputTemplate=esignet/BioAuthIdp/bioAuthResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Biometric RightRingFinger Auth with all valid details VID, uniqueIdentifier=TC_ESignet_BioAuth_18, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:210)
at io.mosip.testrig.apirig.esignet.testscripts.EsignetBioAuth.test(EsignetBioAuth.java:90)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_BioAuth_Biometric_RightRingFinger_With_Valid_uin_Smoke_Pos |
| Testcase Dependency |
| [] |
| Class Name |
| EsignetBioAuth |
| Testcase Input |
| testCaseName=ESignet_BioAuth_Biometric_RightRingFinger_With_Valid_uin_Smoke_Pos, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_6all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_6all_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_BioAuth_smoke_Pos_UIN$", "authFactorType" : "BIO", "challenge" : "$CHALLENGE$", "identityRequest":{ "bioSubType": "Right RingFinger", "bioType": "Finger", "bioValue": "$RIGHTRINGFINGER$", "deviceCode": "bc0b6848-6d45-46d1-a9bd-b334410bf823", "dateTime": "$DATETIME$", "deviceProviderID": "SYNCBYTE.MC01A", "deviceServiceID": "", "deviceServiceVersion": "SB.WIN.001", "deviceProvider": "SYNCBYTE", "deviceProviderId": "SYNCBYTE.LTC165", "deviceSubType": "Slap", "make": "Logitech", "model": "4d36e96c-e325-11ce-bfc1-08002be10318", "serialNo": "78467175", "type": "Finger", "transactionId": "$ID:OAuthDetailsRequest_6all_Valid_Smoke_sid_transactionId$", "identityRequestTemplate": "esignet/BioAuthIdp/BioAuthIdentityEncrypt", "identityRequestEncUrl": "/idauthentication/v1/internal/encrypt" } }, output={ }, inputTemplate=esignet/BioAuthIdp/bioAuth, outputTemplate=esignet/BioAuthIdp/bioAuthResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Biometric RightRingFinger Auth with all valid details UIN, uniqueIdentifier=TC_ESignet_BioAuth_06, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:210)
at io.mosip.testrig.apirig.esignet.testscripts.EsignetBioAuth.test(EsignetBioAuth.java:90)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_BioAuth_Biometric_RightThumb_With_Valid_Vid_Smoke_Pos |
| Testcase Dependency |
| [] |
| Class Name |
| EsignetBioAuth |
| Testcase Input |
| testCaseName=ESignet_BioAuth_Biometric_RightThumb_With_Valid_Vid_Smoke_Pos, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_23all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_23all_Valid_Smoke_sid_transactionId$", "individualId": "$ID:Generate_Perpetual2_VID_Valid_Smoke_sid_vid$", "authFactorType" : "BIO", "challenge" : "$CHALLENGE$", "identityRequest":{ "bioSubType": "Right Thumb", "bioType": "Finger", "bioValue": "$RIGHTTHUMB$", "deviceCode": "bc0b6848-6d45-46d1-a9bd-b334410bf823", "dateTime": "$DATETIME$", "deviceProviderID": "SYNCBYTE.MC01A", "deviceServiceID": "", "deviceServiceVersion": "SB.WIN.001", "deviceProvider": "SYNCBYTE", "deviceProviderId": "SYNCBYTE.LTC165", "deviceSubType": "Slap", "make": "Logitech", "model": "4d36e96c-e325-11ce-bfc1-08002be10318", "serialNo": "78467175", "type": "Finger", "transactionId": "$ID:OAuthDetailsRequest_23all_Valid_Smoke_sid_transactionId$", "identityRequestTemplate": "esignet/BioAuthIdp/BioAuthIdentityEncrypt", "identityRequestEncUrl": "/idauthentication/v1/internal/encrypt" } }, output={ }, inputTemplate=esignet/BioAuthIdp/bioAuth, outputTemplate=esignet/BioAuthIdp/bioAuthResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Biometric RightThumb Auth with all valid details VID, uniqueIdentifier=TC_ESignet_BioAuth_22, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:210)
at io.mosip.testrig.apirig.esignet.testscripts.EsignetBioAuth.test(EsignetBioAuth.java:90)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_BioAuth_Biometric_RightThumb_With_Valid_uin_Smoke_Pos |
| Testcase Dependency |
| [] |
| Class Name |
| EsignetBioAuth |
| Testcase Input |
| testCaseName=ESignet_BioAuth_Biometric_RightThumb_With_Valid_uin_Smoke_Pos, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_10all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_10all_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_BioAuth_smoke_Pos_UIN$", "authFactorType" : "BIO", "challenge" : "$CHALLENGE$", "identityRequest":{ "bioSubType": "Right Thumb", "bioType": "Finger", "bioValue": "$RIGHTTHUMB$", "deviceCode": "bc0b6848-6d45-46d1-a9bd-b334410bf823", "dateTime": "$DATETIME$", "deviceProviderID": "SYNCBYTE.MC01A", "deviceServiceID": "", "deviceServiceVersion": "SB.WIN.001", "deviceProvider": "SYNCBYTE", "deviceProviderId": "SYNCBYTE.LTC165", "deviceSubType": "Slap", "make": "Logitech", "model": "4d36e96c-e325-11ce-bfc1-08002be10318", "serialNo": "78467175", "type": "Finger", "transactionId": "$ID:OAuthDetailsRequest_10all_Valid_Smoke_sid_transactionId$", "identityRequestTemplate": "esignet/BioAuthIdp/BioAuthIdentityEncrypt", "identityRequestEncUrl": "/idauthentication/v1/internal/encrypt" } }, output={ }, inputTemplate=esignet/BioAuthIdp/bioAuth, outputTemplate=esignet/BioAuthIdp/bioAuthResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Biometric RightThumb Auth with all valid details UIN, uniqueIdentifier=TC_ESignet_BioAuth_10, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:210)
at io.mosip.testrig.apirig.esignet.testscripts.EsignetBioAuth.test(EsignetBioAuth.java:90)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_BioAuth_Biometric_RingFinger_With_Valid_Vid_Smoke_Pos |
| Testcase Dependency |
| [] |
| Class Name |
| EsignetBioAuth |
| Testcase Input |
| testCaseName=ESignet_BioAuth_Biometric_RingFinger_With_Valid_Vid_Smoke_Pos, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_15all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_15all_Valid_Smoke_sid_transactionId$", "individualId": "$ID:Generate_Perpetual2_VID_Valid_Smoke_sid_vid$", "authFactorType" : "BIO", "challenge" : "$CHALLENGE$", "identityRequest":{ "bioSubType": "Left RingFinger", "bioType": "Finger", "bioValue": "$LEFTRINGFINGER$", "deviceCode": "bc0b6848-6d45-46d1-a9bd-b334410bf823", "dateTime": "$DATETIME$", "deviceProviderID": "SYNCBYTE.MC01A", "deviceServiceID": "", "deviceServiceVersion": "SB.WIN.001", "deviceProvider": "SYNCBYTE", "deviceProviderId": "SYNCBYTE.LTC165", "deviceSubType": "Slap", "make": "Logitech", "model": "4d36e96c-e325-11ce-bfc1-08002be10318", "serialNo": "78467175", "type": "Finger", "transactionId": "$ID:OAuthDetailsRequest_15all_Valid_Smoke_sid_transactionId$", "identityRequestTemplate": "esignet/BioAuthIdp/BioAuthIdentityEncrypt", "identityRequestEncUrl": "/idauthentication/v1/internal/encrypt" } }, output={ }, inputTemplate=esignet/BioAuthIdp/bioAuth, outputTemplate=esignet/BioAuthIdp/bioAuthResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Biometric RingFinger Auth with all valid details VID, uniqueIdentifier=TC_ESignet_BioAuth_14, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:210)
at io.mosip.testrig.apirig.esignet.testscripts.EsignetBioAuth.test(EsignetBioAuth.java:90)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_BioAuth_Biometric_RingFinger_With_Valid_uin_Smoke_Pos |
| Testcase Dependency |
| [] |
| Class Name |
| EsignetBioAuth |
| Testcase Input |
| testCaseName=ESignet_BioAuth_Biometric_RingFinger_With_Valid_uin_Smoke_Pos, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_2all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_2all_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_BioAuth_smoke_Pos_UIN$", "authFactorType" : "BIO", "challenge" : "$CHALLENGE$", "identityRequest":{ "bioSubType": "Left RingFinger", "bioType": "Finger", "bioValue": "$LEFTRINGFINGER$", "deviceCode": "bc0b6848-6d45-46d1-a9bd-b334410bf823", "dateTime": "$DATETIME$", "deviceProviderID": "SYNCBYTE.MC01A", "deviceServiceID": "", "deviceServiceVersion": "SB.WIN.001", "deviceProvider": "SYNCBYTE", "deviceProviderId": "SYNCBYTE.LTC165", "deviceSubType": "Slap", "make": "Logitech", "model": "4d36e96c-e325-11ce-bfc1-08002be10318", "serialNo": "78467175", "type": "Finger", "transactionId": "$ID:OAuthDetailsRequest_2all_Valid_Smoke_sid_transactionId$", "identityRequestTemplate": "esignet/BioAuthIdp/BioAuthIdentityEncrypt", "identityRequestEncUrl": "/idauthentication/v1/internal/encrypt" } }, output={ }, inputTemplate=esignet/BioAuthIdp/bioAuth, outputTemplate=esignet/BioAuthIdp/bioAuthResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Biometric RingFinger Auth with all valid details UIN, uniqueIdentifier=TC_ESignet_BioAuth_02, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:210)
at io.mosip.testrig.apirig.esignet.testscripts.EsignetBioAuth.test(EsignetBioAuth.java:90)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_SendOtp_Vid_Diff_RequestTime_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=ESignet_SendOtp_Vid_Diff_RequestTime_Neg, endPoint=/v1/esignet/authorization/send-otp, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_all_Valid_Smoke_sid_encodedResp$", "requestTime": "2022-11-07T06:51:30.195Z", "transactionId": "$ID:OAuthDetailsRequest_all_Valid_Smoke_sid_transactionId$", "individualId": "$ID:Generate_Perpetual_VID_Invalid_Scen_Valid_Smoke_sid_vid$", "otpChannels": [{channel: "email"},{channel: "phone"}] }, output={ "errors": [ { "errorCode": "invalid_request" } ] }, inputTemplate=esignet/SendOtp/SendOtp, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=SendOtp with different requestTime VID, uniqueIdentifier=TC_ESignet_SendOtp_27, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePost.test(SimplePost.java:98)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_SendOtp_Vid_Empty_OtpChannel_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=ESignet_SendOtp_Vid_Empty_OtpChannel_Neg, endPoint=/v1/esignet/authorization/send-otp, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_all_Valid_Smoke_sid_transactionId$", "individualId": "$ID:Generate_Perpetual_VID_Invalid_Scen_Valid_Smoke_sid_vid$", "otpChannels": "" }, output={ "errors": [ { "errorCode": "invalid_request" } ] }, inputTemplate=esignet/SendOtp/SendOtpEmptyOtpChannel, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=SendOtp with empty value in OtpChannels VID, uniqueIdentifier=TC_ESignet_SendOtp_43, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePost.test(SimplePost.java:98)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_SendOtp_Vid_Empty_OtpChannels_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=ESignet_SendOtp_Vid_Empty_OtpChannels_Neg, endPoint=/v1/esignet/authorization/send-otp, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_all_Valid_Smoke_sid_transactionId$", "individualId": "$ID:Generate_Perpetual_VID_Invalid_Scen_Valid_Smoke_sid_vid$", "otpChannels": [{channel: ""},{channel: ""}] }, output={ "errors": [ { "errorCode": "invalid_otp_channel" } ] }, inputTemplate=esignet/SendOtp/SendOtp, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=SendOtp with empty value in OtpChannels VID, uniqueIdentifier=TC_ESignet_SendOtp_40, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePost.test(SimplePost.java:98)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_SendOtp_Vid_Empty_individualId_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=ESignet_SendOtp_Vid_Empty_individualId_Neg, endPoint=/v1/esignet/authorization/send-otp, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_all_Valid_Smoke_sid_transactionId$", "individualId": "", "otpChannels": [{channel: "email"},{channel: "phone"}] }, output={ "errors": [ { "errorCode": "invalid_identifier" } ] }, inputTemplate=esignet/SendOtp/SendOtp, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=SendOtp with empty value in individualId VID, uniqueIdentifier=TC_ESignet_SendOtp_36, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePost.test(SimplePost.java:98)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_SendOtp_Vid_Empty_transactionId_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=ESignet_SendOtp_Vid_Empty_transactionId_Neg, endPoint=/v1/esignet/authorization/send-otp, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "", "individualId": "$ID:Generate_Perpetual_VID_Invalid_Scen_Valid_Smoke_sid_vid$", "otpChannels": [{channel: "email"},{channel: "phone"}] }, output={ "errors": [ { "errorCode": "invalid_transaction" } ] }, inputTemplate=esignet/SendOtp/SendOtp, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=SendOtp with empty value in transactionId VID, uniqueIdentifier=TC_ESignet_SendOtp_32, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePost.test(SimplePost.java:98)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_SendOtp_Vid_Expired_transactionId_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=ESignet_SendOtp_Vid_Expired_transactionId_Neg, endPoint=/v1/esignet/authorization/send-otp, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "4eKDB4GPk6fP8XXEDY7rktwtQF6WiwrOCehT2CwyVT0", "individualId": "$ID:Generate_Perpetual_VID_Invalid_Scen_Valid_Smoke_sid_vid$", "otpChannels": [{channel: "email"},{channel: "phone"}] }, output={ "errors": [ { "errorCode": "invalid_transaction" } ] }, inputTemplate=esignet/SendOtp/SendOtp, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=SendOtp with expired transactionId VID, uniqueIdentifier=TC_ESignet_SendOtp_30, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePost.test(SimplePost.java:98)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_SendOtp_Vid_Future_RequestTime_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=ESignet_SendOtp_Vid_Future_RequestTime_Neg, endPoint=/v1/esignet/authorization/send-otp, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_all_Valid_Smoke_sid_encodedResp$", "requestTime": "2033-11-07T06:51:30.195Z", "transactionId": "$ID:OAuthDetailsRequest_all_Valid_Smoke_sid_transactionId$", "individualId": "$ID:Generate_Perpetual_VID_Invalid_Scen_Valid_Smoke_sid_vid$", "otpChannels": [{channel: "email"},{channel: "phone"}] }, output={ "errors": [ { "errorCode": "invalid_request" } ] }, inputTemplate=esignet/SendOtp/SendOtp, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=SendOtp with future requestTime VID, uniqueIdentifier=TC_ESignet_SendOtp_28, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePost.test(SimplePost.java:98)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_SendOtp_Vid_Invalid_OtpChannels_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=ESignet_SendOtp_Vid_Invalid_OtpChannels_Neg, endPoint=/v1/esignet/authorization/send-otp, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_all_Valid_Smoke_sid_transactionId$", "individualId": "$ID:Generate_Perpetual_VID_Invalid_Scen_Valid_Smoke_sid_vid$", "otpChannels": [{channel: "Random1"},{channel: "Random2"}] }, output={ "errors": [ { "errorCode": "invalid_otp_channel" } ] }, inputTemplate=esignet/SendOtp/SendOtp, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=SendOtp with invalid OtpChannels VID, uniqueIdentifier=TC_ESignet_SendOtp_38, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePost.test(SimplePost.java:98)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_SendOtp_Vid_Invalid_RequestTime_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=ESignet_SendOtp_Vid_Invalid_RequestTime_Neg, endPoint=/v1/esignet/authorization/send-otp, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_all_Valid_Smoke_sid_encodedResp$", "requestTime": "2022-11-08T06:35:53", "transactionId": "$ID:OAuthDetailsRequest_all_Valid_Smoke_sid_transactionId$", "individualId": "$ID:Generate_Perpetual_VID_Invalid_Scen_Valid_Smoke_sid_vid$", "otpChannels": [{channel: "email"},{channel: "phone"}] }, output={ "errors": [ { "errorCode": "invalid_request" } ] }, inputTemplate=esignet/SendOtp/SendOtp, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=SendOtp with invalid requestTime VID, uniqueIdentifier=TC_ESignet_SendOtp_26, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePost.test(SimplePost.java:98)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_SendOtp_Vid_Invalid_individualId_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=ESignet_SendOtp_Vid_Invalid_individualId_Neg, endPoint=/v1/esignet/authorization/send-otp, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_transactionId$", "individualId": "@@#$#VGH", "otpChannels": [{channel: "email"},{channel: "phone"}] }, output={ "errors": [ { "errorCode": "IDA-MLC-009" } ] }, inputTemplate=esignet/SendOtp/SendOtp, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=SendOtp with invalid individualId VID, uniqueIdentifier=TC_ESignet_SendOtp_34, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePost.test(SimplePost.java:98)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_SendOtp_Vid_Invalid_transactionId_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=ESignet_SendOtp_Vid_Invalid_transactionId_Neg, endPoint=/v1/esignet/authorization/send-otp, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "transactionId", "individualId": "$ID:Generate_Perpetual_VID_Invalid_Scen_Valid_Smoke_sid_vid$", "otpChannels": [{channel: "email"},{channel: "phone"}] }, output={ "errors": [ { "errorCode": "invalid_transaction" } ] }, inputTemplate=esignet/SendOtp/SendOtp, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=SendOtp with invalid transactionId VID, uniqueIdentifier=TC_ESignet_SendOtp_29, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePost.test(SimplePost.java:98)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_SendOtp_Vid_Missing_OtpChannel_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=ESignet_SendOtp_Vid_Missing_OtpChannel_Neg, endPoint=/v1/esignet/authorization/send-otp, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_all_Valid_Smoke_sid_transactionId$", "individualId": "$ID:Generate_Perpetual_VID_Invalid_Scen_Valid_Smoke_sid_vid$", "otpChannels": "$REMOVE$" }, output={ "errors": [ { "errorCode": "invalid_request" } ] }, inputTemplate=esignet/SendOtp/SendOtpEmptyOtpChannel, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=SendOtp without OtpChannels VID, uniqueIdentifier=TC_ESignet_SendOtp_42, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePost.test(SimplePost.java:98)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_SendOtp_Vid_Missing_OtpChannels_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=ESignet_SendOtp_Vid_Missing_OtpChannels_Neg, endPoint=/v1/esignet/authorization/send-otp, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_all_Valid_Smoke_sid_transactionId$", "individualId": "$ID:Generate_Perpetual_VID_Invalid_Scen_Valid_Smoke_sid_vid$", "otpChannels": [{channel: "$REMOVE$"},{channel: "$REMOVE$"}] }, output={ "errors": [ { "errorCode": "invalid_otp_channel" } ] }, inputTemplate=esignet/SendOtp/SendOtp, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=SendOtp without OtpChannels VID, uniqueIdentifier=TC_ESignet_SendOtp_39, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePost.test(SimplePost.java:98)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_SendOtp_Vid_Missing_individualId_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=ESignet_SendOtp_Vid_Missing_individualId_Neg, endPoint=/v1/esignet/authorization/send-otp, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_all_Valid_Smoke_sid_transactionId$", "individualId": "$REMOVE$", "otpChannels": [{channel: "email"},{channel: "phone"}] }, output={ "errors": [ { "errorCode": "invalid_identifier" } ] }, inputTemplate=esignet/SendOtp/SendOtp, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=SendOtp without individualId VID, uniqueIdentifier=TC_ESignet_SendOtp_35, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePost.test(SimplePost.java:98)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_SendOtp_Vid_Missing_transactionId_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=ESignet_SendOtp_Vid_Missing_transactionId_Neg, endPoint=/v1/esignet/authorization/send-otp, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$REMOVE$", "individualId": "$ID:Generate_Perpetual_VID_Invalid_Scen_Valid_Smoke_sid_vid$", "otpChannels": [{channel: "email"},{channel: "phone"}] }, output={ "errors": [ { "errorCode": "invalid_transaction" } ] }, inputTemplate=esignet/SendOtp/SendOtp, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=SendOtp without transactionId VID, uniqueIdentifier=TC_ESignet_SendOtp_31, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePost.test(SimplePost.java:98)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_SendOtp_Vid_Null_OtpChannel_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=ESignet_SendOtp_Vid_Null_OtpChannel_Neg, endPoint=/v1/esignet/authorization/send-otp, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_all_Valid_Smoke_sid_transactionId$", "individualId": "$ID:Generate_Perpetual_VID_Invalid_Scen_Valid_Smoke_sid_vid$", "otpChannels": "null" }, output={ "errors": [ { "errorCode": "invalid_request" } ] }, inputTemplate=esignet/SendOtp/SendOtpEmptyOtpChannel, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=SendOtp with Null in OtpChannels VID, uniqueIdentifier=TC_ESignet_SendOtp_44, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePost.test(SimplePost.java:98)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_SendOtp_Vid_Null_OtpChannels_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=ESignet_SendOtp_Vid_Null_OtpChannels_Neg, endPoint=/v1/esignet/authorization/send-otp, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_all_Valid_Smoke_sid_transactionId$", "individualId": "$ID:Generate_Perpetual_VID_Invalid_Scen_Valid_Smoke_sid_vid$", "otpChannels": [{channel: "null"},{channel: "null"}] }, output={ "errors": [ { "errorCode": "invalid_otp_channel" } ] }, inputTemplate=esignet/SendOtp/SendOtp, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=SendOtp with Null in OtpChannels VID, uniqueIdentifier=TC_ESignet_SendOtp_41, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePost.test(SimplePost.java:98)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_SendOtp_Vid_Null_individualId_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=ESignet_SendOtp_Vid_Null_individualId_Neg, endPoint=/v1/esignet/authorization/send-otp, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_transactionId$", "individualId": "null", "otpChannels": [{channel: "email"},{channel: "phone"}] }, output={ "errors": [ { "errorCode": "IDA-MLC-009" } ] }, inputTemplate=esignet/SendOtp/SendOtp, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=SendOtp with Null in individualId VID, uniqueIdentifier=TC_ESignet_SendOtp_37, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePost.test(SimplePost.java:98)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_SendOtp_Vid_Null_transactionId_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=ESignet_SendOtp_Vid_Null_transactionId_Neg, endPoint=/v1/esignet/authorization/send-otp, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "null", "individualId": "$ID:Generate_Perpetual_VID_Invalid_Scen_Valid_Smoke_sid_vid$", "otpChannels": [{channel: "email"},{channel: "phone"}] }, output={ "errors": [ { "errorCode": "invalid_transaction" } ] }, inputTemplate=esignet/SendOtp/SendOtp, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=SendOtp with Null in transactionId VID, uniqueIdentifier=TC_ESignet_SendOtp_33, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePost.test(SimplePost.java:98)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_SendOtp_Vid_SpaceSeparated_otpChannels_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=ESignet_SendOtp_Vid_SpaceSeparated_otpChannels_Neg, endPoint=/v1/esignet/authorization/send-otp, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_all_Valid_Smoke_sid_transactionId$", "individualId": "$ID:Generate_Perpetual_VID_Valid_Smoke_sid_vid$", "otpChannels": [{channel: "email"},{channel: "s m s"}] }, output={ "errors": [ { "errorCode": "invalid_otp_channel" } ] }, inputTemplate=esignet/SendOtp/SendOtp, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=SendOtp to space separated OtpChannels VID, uniqueIdentifier=TC_ESignet_SendOtp_06, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePost.test(SimplePost.java:98)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_SendOtp_Vid_all_Valid_Smoke |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=ESignet_SendOtp_Vid_all_Valid_Smoke, endPoint=/v1/esignet/authorization/send-otp, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_SendOtp_Vid_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_SendOtp_Vid_Valid_Smoke_sid_transactionId$", "individualId": "$ID:Generate_Perpetual_VID_Valid_Smoke_sid_vid$", "otpChannels": [{channel: "email"},{channel: "phone"}] }, output={ }, inputTemplate=esignet/SendOtp/SendOtp, outputTemplate=esignet/SendOtp/SendOtpResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=SendOtp with all valid details VID, uniqueIdentifier=TC_ESignet_SendOtp_04, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePost.test(SimplePost.java:98)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_SendOtp_NR_Email_Uin_Neg |
| Testcase Dependency |
| [TC_ESignet_OAuthDetailsRequest_08, TC_ESignet_CreateOIDCClient_01, Dependent_Idrepo_AddIdentity_06] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=ESignet_SendOtp_NR_Email_Uin_Neg, endPoint=/v1/esignet/authorization/send-otp, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_Valid_Params_WOEmail_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}] }, output={ }, inputTemplate=esignet/SendOtp/SendOtp, outputTemplate=esignet/SendOtp/SendOtpResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=SendOtp to unregistered email UIN, uniqueIdentifier=TC_ESignet_SendOtp_02, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_SendOtp_NR_Phone_Uin_Neg |
| Testcase Dependency |
| [TC_ESignet_OAuthDetailsRequest_08, TC_ESignet_CreateOIDCClient_01, Dependent_Idrepo_AddIdentity_05] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=ESignet_SendOtp_NR_Phone_Uin_Neg, endPoint=/v1/esignet/authorization/send-otp, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_Valid_Params_WOPhone_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}] }, output={ }, inputTemplate=esignet/SendOtp/SendOtp, outputTemplate=esignet/SendOtp/SendOtpResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=SendOtp to unregistered Phone UIN, uniqueIdentifier=TC_ESignet_SendOtp_03, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_SendOtp_uin_Diff_RequestTime_Neg |
| Testcase Dependency |
| [Dependent_Idrepo_AddIdentity_03, TC_ESignet_OAuthDetailsRequest_01, TC_ESignet_CreateOIDCClient_01] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=ESignet_SendOtp_uin_Diff_RequestTime_Neg, endPoint=/v1/esignet/authorization/send-otp, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_all_Valid_Smoke_sid_encodedResp$", "requestTime": "2022-11-07T06:51:30.195Z", "transactionId": "$ID:OAuthDetailsRequest_all_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_Invalid_Scen_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}] }, output={ "errors": [ { "errorCode": "invalid_request" } ] }, inputTemplate=esignet/SendOtp/SendOtp, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=SendOtp with different requestTime UIN, uniqueIdentifier=TC_ESignet_SendOtp_08, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_SendOtp_uin_Empty_OtpChannel_Neg |
| Testcase Dependency |
| [Dependent_Idrepo_AddIdentity_03, TC_ESignet_OAuthDetailsRequest_01, TC_ESignet_CreateOIDCClient_01] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=ESignet_SendOtp_uin_Empty_OtpChannel_Neg, endPoint=/v1/esignet/authorization/send-otp, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_all_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_Invalid_Scen_smoke_Pos_UIN$", "otpChannels": "" }, output={ "errors": [ { "errorCode": "invalid_request" } ] }, inputTemplate=esignet/SendOtp/SendOtpEmptyOtpChannel, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=SendOtp with empty value in OtpChannels UIN, uniqueIdentifier=TC_ESignet_SendOtp_24, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_SendOtp_uin_Empty_OtpChannels_Neg |
| Testcase Dependency |
| [Dependent_Idrepo_AddIdentity_03, TC_ESignet_OAuthDetailsRequest_01, TC_ESignet_CreateOIDCClient_01] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=ESignet_SendOtp_uin_Empty_OtpChannels_Neg, endPoint=/v1/esignet/authorization/send-otp, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_all_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_Invalid_Scen_smoke_Pos_UIN$", "otpChannels": [{channel: ""},{channel: ""}] }, output={ "errors": [ { "errorCode": "invalid_otp_channel" } ] }, inputTemplate=esignet/SendOtp/SendOtp, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=SendOtp with empty value in OtpChannels UIN, uniqueIdentifier=TC_ESignet_SendOtp_21, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_SendOtp_uin_Empty_individualId_Neg |
| Testcase Dependency |
| [TC_ESignet_OAuthDetailsRequest_01, TC_ESignet_CreateOIDCClient_01] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=ESignet_SendOtp_uin_Empty_individualId_Neg, endPoint=/v1/esignet/authorization/send-otp, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_all_Valid_Smoke_sid_transactionId$", "individualId": "", "otpChannels": [{channel: "email"},{channel: "phone"}] }, output={ "errors": [ { "errorCode": "invalid_identifier" } ] }, inputTemplate=esignet/SendOtp/SendOtp, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=SendOtp with empty value in individualId UIN, uniqueIdentifier=TC_ESignet_SendOtp_17, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_SendOtp_uin_Empty_transactionId_Neg |
| Testcase Dependency |
| [Dependent_Idrepo_AddIdentity_03, TC_ESignet_OAuthDetailsRequest_01, TC_ESignet_CreateOIDCClient_01] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=ESignet_SendOtp_uin_Empty_transactionId_Neg, endPoint=/v1/esignet/authorization/send-otp, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "", "individualId": "$ID:AddIdentity_Invalid_Scen_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}] }, output={ "errors": [ { "errorCode": "invalid_transaction" } ] }, inputTemplate=esignet/SendOtp/SendOtp, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=SendOtp with empty value in transactionId UIN, uniqueIdentifier=TC_ESignet_SendOtp_13, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_SendOtp_uin_Expired_transactionId_Neg |
| Testcase Dependency |
| [Dependent_Idrepo_AddIdentity_03, TC_ESignet_OAuthDetailsRequest_01, TC_ESignet_CreateOIDCClient_01] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=ESignet_SendOtp_uin_Expired_transactionId_Neg, endPoint=/v1/esignet/authorization/send-otp, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "4eKDB4GPk6fP8XXEDY7rktwtQF6WiwrOCehT2CwyVT0", "individualId": "$ID:AddIdentity_Invalid_Scen_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}] }, output={ "errors": [ { "errorCode": "invalid_transaction" } ] }, inputTemplate=esignet/SendOtp/SendOtp, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=SendOtp with expired transactionId UIN, uniqueIdentifier=TC_ESignet_SendOtp_11, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_SendOtp_uin_Future_RequestTime_Neg |
| Testcase Dependency |
| [Dependent_Idrepo_AddIdentity_03, TC_ESignet_OAuthDetailsRequest_01, TC_ESignet_CreateOIDCClient_01] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=ESignet_SendOtp_uin_Future_RequestTime_Neg, endPoint=/v1/esignet/authorization/send-otp, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_all_Valid_Smoke_sid_encodedResp$", "requestTime": "2033-11-07T06:51:30.195Z", "transactionId": "$ID:OAuthDetailsRequest_all_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_Invalid_Scen_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}] }, output={ "errors": [ { "errorCode": "invalid_request" } ] }, inputTemplate=esignet/SendOtp/SendOtp, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=SendOtp with future requestTime UIN, uniqueIdentifier=TC_ESignet_SendOtp_09, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_SendOtp_uin_Invalid_OtpChannels_Neg |
| Testcase Dependency |
| [Dependent_Idrepo_AddIdentity_03, TC_ESignet_OAuthDetailsRequest_01, TC_ESignet_CreateOIDCClient_01] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=ESignet_SendOtp_uin_Invalid_OtpChannels_Neg, endPoint=/v1/esignet/authorization/send-otp, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_all_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_Invalid_Scen_smoke_Pos_UIN$", "otpChannels": [{channel: "Random1"},{channel: "Random2"}] }, output={ "errors": [ { "errorCode": "invalid_otp_channel" } ] }, inputTemplate=esignet/SendOtp/SendOtp, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=SendOtp to invalid OtpChannels UIN, uniqueIdentifier=TC_ESignet_SendOtp_19, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_SendOtp_uin_Invalid_RequestTime_Neg |
| Testcase Dependency |
| [Dependent_Idrepo_AddIdentity_03, TC_ESignet_OAuthDetailsRequest_01, TC_ESignet_CreateOIDCClient_01] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=ESignet_SendOtp_uin_Invalid_RequestTime_Neg, endPoint=/v1/esignet/authorization/send-otp, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_all_Valid_Smoke_sid_encodedResp$", "requestTime": "2022-11-08T06:35:53", "transactionId": "$ID:OAuthDetailsRequest_all_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_Invalid_Scen_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}] }, output={ "errors": [ { "errorCode": "invalid_request" } ] }, inputTemplate=esignet/SendOtp/SendOtp, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=SendOtp with invalid requestTime UIN, uniqueIdentifier=TC_ESignet_SendOtp_07, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_SendOtp_uin_Invalid_individualId_Neg |
| Testcase Dependency |
| [TC_ESignet_OAuthDetailsRequest_08, TC_ESignet_CreateOIDCClient_01] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=ESignet_SendOtp_uin_Invalid_individualId_Neg, endPoint=/v1/esignet/authorization/send-otp, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_transactionId$", "individualId": "@@#$#VGH", "otpChannels": [{channel: "email"},{channel: "phone"}] }, output={ "errors": [ { "errorCode": "IDA-MLC-009" } ] }, inputTemplate=esignet/SendOtp/SendOtp, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=IDA-MLC-009,invalid_individual_id, kycFields=null, description=SendOtp with invalid individualId UIN, uniqueIdentifier=TC_ESignet_SendOtp_15, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_SendOtp_uin_Invalid_transactionId_Neg |
| Testcase Dependency |
| [Dependent_Idrepo_AddIdentity_03, TC_ESignet_OAuthDetailsRequest_01, TC_ESignet_CreateOIDCClient_01] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=ESignet_SendOtp_uin_Invalid_transactionId_Neg, endPoint=/v1/esignet/authorization/send-otp, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "transactionId", "individualId": "$ID:AddIdentity_Invalid_Scen_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}] }, output={ "errors": [ { "errorCode": "invalid_transaction" } ] }, inputTemplate=esignet/SendOtp/SendOtp, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=SendOtp with invalid transactionId UIN, uniqueIdentifier=TC_ESignet_SendOtp_10, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_SendOtp_uin_Missing_OtpChannel_Neg |
| Testcase Dependency |
| [Dependent_Idrepo_AddIdentity_03, TC_ESignet_OAuthDetailsRequest_01, TC_ESignet_CreateOIDCClient_01] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=ESignet_SendOtp_uin_Missing_OtpChannel_Neg, endPoint=/v1/esignet/authorization/send-otp, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_all_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_Invalid_Scen_smoke_Pos_UIN$", "otpChannels": "$REMOVE$" }, output={ "errors": [ { "errorCode": "invalid_request" } ] }, inputTemplate=esignet/SendOtp/SendOtpEmptyOtpChannel, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=SendOtp without OtpChannels UIN, uniqueIdentifier=TC_ESignet_SendOtp_23, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_SendOtp_uin_Missing_OtpChannels_Neg |
| Testcase Dependency |
| [Dependent_Idrepo_AddIdentity_03, TC_ESignet_OAuthDetailsRequest_01, TC_ESignet_CreateOIDCClient_01] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=ESignet_SendOtp_uin_Missing_OtpChannels_Neg, endPoint=/v1/esignet/authorization/send-otp, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_all_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_Invalid_Scen_smoke_Pos_UIN$", "otpChannels": [{channel: "$REMOVE$"},{channel: "$REMOVE$"}] }, output={ "errors": [ { "errorCode": "invalid_otp_channel" } ] }, inputTemplate=esignet/SendOtp/SendOtp, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=SendOtp without OtpChannels UIN, uniqueIdentifier=TC_ESignet_SendOtp_20, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_SendOtp_uin_Missing_individualId_Neg |
| Testcase Dependency |
| [TC_ESignet_OAuthDetailsRequest_01, TC_ESignet_CreateOIDCClient_01] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=ESignet_SendOtp_uin_Missing_individualId_Neg, endPoint=/v1/esignet/authorization/send-otp, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_all_Valid_Smoke_sid_transactionId$", "individualId": "$REMOVE$", "otpChannels": [{channel: "email"},{channel: "phone"}] }, output={ "errors": [ { "errorCode": "invalid_identifier" } ] }, inputTemplate=esignet/SendOtp/SendOtp, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=SendOtp without individualId UIN, uniqueIdentifier=TC_ESignet_SendOtp_16, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_SendOtp_uin_Missing_transactionId_Neg |
| Testcase Dependency |
| [Dependent_Idrepo_AddIdentity_03, TC_ESignet_OAuthDetailsRequest_01, TC_ESignet_CreateOIDCClient_01] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=ESignet_SendOtp_uin_Missing_transactionId_Neg, endPoint=/v1/esignet/authorization/send-otp, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$REMOVE$", "individualId": "$ID:AddIdentity_Invalid_Scen_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}] }, output={ "errors": [ { "errorCode": "invalid_transaction" } ] }, inputTemplate=esignet/SendOtp/SendOtp, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=SendOtp without transactionId UIN, uniqueIdentifier=TC_ESignet_SendOtp_12, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_SendOtp_uin_Null_OtpChannel_Neg |
| Testcase Dependency |
| [Dependent_Idrepo_AddIdentity_03, TC_ESignet_OAuthDetailsRequest_01, TC_ESignet_CreateOIDCClient_01] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=ESignet_SendOtp_uin_Null_OtpChannel_Neg, endPoint=/v1/esignet/authorization/send-otp, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_all_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_Invalid_Scen_smoke_Pos_UIN$", "otpChannels": "null" }, output={ "errors": [ { "errorCode": "invalid_request" } ] }, inputTemplate=esignet/SendOtp/SendOtpEmptyOtpChannel, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=SendOtp with Null in OtpChannels UIN, uniqueIdentifier=TC_ESignet_SendOtp_25, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_SendOtp_uin_Null_OtpChannels_Neg |
| Testcase Dependency |
| [Dependent_Idrepo_AddIdentity_03, TC_ESignet_OAuthDetailsRequest_01, TC_ESignet_CreateOIDCClient_01] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=ESignet_SendOtp_uin_Null_OtpChannels_Neg, endPoint=/v1/esignet/authorization/send-otp, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_all_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_Invalid_Scen_smoke_Pos_UIN$", "otpChannels": [{channel: "null"},{channel: "null"}] }, output={ "errors": [ { "errorCode": "invalid_otp_channel" } ] }, inputTemplate=esignet/SendOtp/SendOtp, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=SendOtp with Null in OtpChannels UIN, uniqueIdentifier=TC_ESignet_SendOtp_22, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_SendOtp_uin_Null_individualId_Neg |
| Testcase Dependency |
| [TC_ESignet_OAuthDetailsRequest_08, TC_ESignet_CreateOIDCClient_01] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=ESignet_SendOtp_uin_Null_individualId_Neg, endPoint=/v1/esignet/authorization/send-otp, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_transactionId$", "individualId": "null", "otpChannels": [{channel: "email"},{channel: "phone"}] }, output={ "errors": [ { "errorCode": "IDA-MLC-009" } ] }, inputTemplate=esignet/SendOtp/SendOtp, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=IDA-MLC-009,invalid_individual_id, kycFields=null, description=SendOtp with Null in individualId UIN, uniqueIdentifier=TC_ESignet_SendOtp_18, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_SendOtp_uin_Null_transactionId_Neg |
| Testcase Dependency |
| [Dependent_Idrepo_AddIdentity_03, TC_ESignet_OAuthDetailsRequest_01, TC_ESignet_CreateOIDCClient_01] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=ESignet_SendOtp_uin_Null_transactionId_Neg, endPoint=/v1/esignet/authorization/send-otp, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "null", "individualId": "$ID:AddIdentity_Invalid_Scen_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}] }, output={ "errors": [ { "errorCode": "invalid_transaction" } ] }, inputTemplate=esignet/SendOtp/SendOtp, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=SendOtp with Null in transactionId UIN, uniqueIdentifier=TC_ESignet_SendOtp_14, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_SendOtp_uin_SpaceSeparated_otpChannels_Neg |
| Testcase Dependency |
| [Dependent_Idrepo_AddIdentity_03, TC_ESignet_OAuthDetailsRequest_01, TC_ESignet_CreateOIDCClient_01] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=ESignet_SendOtp_uin_SpaceSeparated_otpChannels_Neg, endPoint=/v1/esignet/authorization/send-otp, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_all_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_Invalid_Scen_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "s m s"}] }, output={ "errors": [ { "errorCode": "invalid_otp_channel" } ] }, inputTemplate=esignet/SendOtp/SendOtp, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=SendOtp to space separated OtpChannels UIN, uniqueIdentifier=TC_ESignet_SendOtp_05, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_SendOtp_uin_all_Valid_Smoke |
| Testcase Dependency |
| [Dependent_Idrepo_AddIdentity_01, TC_ESignet_OAuthDetailsRequest_01, TC_ESignet_CreateOIDCClient_01] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=ESignet_SendOtp_uin_all_Valid_Smoke, endPoint=/v1/esignet/authorization/send-otp, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_all_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_Valid_Parameters_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}] }, output={ }, inputTemplate=esignet/SendOtp/SendOtp, outputTemplate=esignet/SendOtp/SendOtpResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=SendOtp with all valid details UIN, uniqueIdentifier=TC_ESignet_SendOtp_01, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_AuthenticateUserIDP_Consent_Vid_Otp_Same_Claims |
| Testcase Dependency |
| [] |
| Class Name |
| PostWithAutogenIdWithOtpGenerate |
| Testcase Input |
| testCaseName=ESignet_AuthenticateUserIDP_Consent_Vid_Otp_Same_Claims, endPoint=/v1/esignet/authorization/v2/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_Consent_Vid_2nd_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_Consent_Vid_2nd_Valid_Smoke_sid_transactionId$", "individualId": "$ID:Generate_Perpetual_VID_Consent_Valid_Smoke_sid_vid$", "authFactorType" : "OTP", "challenge" : "$ID:AddIdentity_Consent_Vid_smoke_Pos_EMAIL$", "sendOtp":{ "encodedHash": "$ID:OAuthDetailsRequest_Consent_Vid_2nd_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_Consent_Vid_2nd_Valid_Smoke_sid_transactionId$", "individualId": "$ID:Generate_Perpetual_VID_Consent_Valid_Smoke_sid_vid$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendOtp/SendOtp", "sendOtpEndPoint": "/v1/esignet/authorization/send-otp" } }, output={ "consentAction": "NOCAPTURE", "sendOtpResp":{ "sendOtpResTemplate":"esignet/SendOtp/SendOtpResult" } }, inputTemplate=esignet/Consent/AuthenticateUserConsent/AuthenticateUserConsent, outputTemplate=esignet/Consent/AuthenticateUserConsent/AuthenticateUserConsentResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Authenticate user consent Otp with same claims VID, uniqueIdentifier=TC_ESignet_AuthenticateUser_06, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.PostWithAutogenIdWithOtpGenerate.test(PostWithAutogenIdWithOtpGenerate.java:98)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_AuthenticateUserIDP_Otp_Vid_Invalid_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PostWithAutogenIdWithOtpGenerate |
| Testcase Input |
| testCaseName=ESignet_AuthenticateUserIDP_Otp_Vid_Invalid_Neg, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_transactionId$", "individualId": "$ID:Generate_Temporary_VID_Valid_Smoke_sid_vid$", "authFactorType" : "OTP", "challenge" : "$ID:AddIdentity_Vid_Generation_smoke_Pos_EMAIL$", "sendOtp":{ "encodedHash": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_transactionId$", "individualId": "$ID:Generate_Perpetual_VID_Valid_Smoke_sid_vid$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendOtp/SendOtp", "sendOtpEndPoint": "/v1/esignet/authorization/send-otp" } }, output={ "errors": [ { "errorCode": "IDA-OTA-012" } ], "sendOtpResp":{ "sendOtpResTemplate":"esignet/SendOtp/SendOtpResult" } }, inputTemplate=esignet/AuthenticateUser/AuthenticateUser, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Authenticate user Otp with invalid VID, uniqueIdentifier=TC_ESignet_AuthenticateUser_07, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.PostWithAutogenIdWithOtpGenerate.test(PostWithAutogenIdWithOtpGenerate.java:98)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_AuthenticateUserIDP_Otp_Vid_Valid_Smoke |
| Testcase Dependency |
| [] |
| Class Name |
| PostWithAutogenIdWithOtpGenerate |
| Testcase Input |
| testCaseName=ESignet_AuthenticateUserIDP_Otp_Vid_Valid_Smoke, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_Vid_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_Vid_Valid_Smoke_sid_transactionId$", "individualId": "$ID:Generate_Perpetual_VID_Valid_Smoke_sid_vid$", "authFactorType" : "OTP", "challenge" : "$ID:AddIdentity_Vid_Generation_smoke_Pos_EMAIL$", "sendOtp":{ "encodedHash": "$ID:OAuthDetailsRequest_Vid_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_Vid_Valid_Smoke_sid_transactionId$", "individualId": "$ID:Generate_Perpetual_VID_Valid_Smoke_sid_vid$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendOtp/SendOtp", "sendOtpEndPoint": "/v1/esignet/authorization/send-otp" } }, output={ "sendOtpResp":{ "sendOtpResTemplate":"esignet/SendOtp/SendOtpResult" } }, inputTemplate=esignet/AuthenticateUser/AuthenticateUser, outputTemplate=esignet/AuthenticateUser/AuthenticateUserResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Authenticate user with valid details VID, uniqueIdentifier=TC_ESignet_AuthenticateUser_05, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.PostWithAutogenIdWithOtpGenerate.test(PostWithAutogenIdWithOtpGenerate.java:98)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_AuthenticateUserIDP_Vid_2_Otp_UnAuthenticated_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PostWithAutogenIdWithOtpGenerate |
| Testcase Input |
| testCaseName=ESignet_AuthenticateUserIDP_Vid_2_Otp_UnAuthenticated_Neg, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_2_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_2_all_Valid_Smoke_sid_transactionId$", "individualId": "$ID:Generate_Perpetual_VID_Invalid_Scen_Valid_Smoke_sid_vid$", "authFactorType" : "OTP", "challenge" : "$ID:AddIdentity_Invalid_Scen_smoke_Pos_EMAIL$", "sendOtp":{ "encodedHash": "$ID:OAuthDetailsRequest_vid_Other_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_vid_Other_Valid_Smoke_sid_transactionId$", "individualId": "$ID:Generate_Perpetual_VID_Invalid_Scen_Valid_Smoke_sid_vid$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendOtp/SendOtp", "sendOtpEndPoint": "/v1/esignet/authorization/send-otp" } }, output={ "errors": [ { "errorCode": "IDA-OTA-005" } ], "sendOtpResp":{ "sendOtpResTemplate":"esignet/SendOtp/SendOtpResult" } }, inputTemplate=esignet/AuthenticateUser/AuthenticateUser, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Send authentication request with unauthenticated transactionId VID, uniqueIdentifier=TC_ESignet_AuthenticateUser_32, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.PostWithAutogenIdWithOtpGenerate.test(PostWithAutogenIdWithOtpGenerate.java:98)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_AuthenticateUserIDP_Vid_2nd_Otp_Valid_Smoke |
| Testcase Dependency |
| [] |
| Class Name |
| PostWithAutogenIdWithOtpGenerate |
| Testcase Input |
| testCaseName=ESignet_AuthenticateUserIDP_Vid_2nd_Otp_Valid_Smoke, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_2nd_vid_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_2nd_vid_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_Valid_Parameters_smoke_Pos_UIN$", "authFactorType" : "OTP", "challenge" : "$ID:AddIdentity_Valid_Parameters_smoke_Pos_EMAIL$", "sendOtp":{ "encodedHash": "$ID:OAuthDetailsRequest_2nd_vid_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_2nd_vid_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_Valid_Parameters_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendOtp/SendOtp", "sendOtpEndPoint": "/v1/esignet/authorization/send-otp" } }, output={ "sendOtpResp":{ "sendOtpResTemplate":"esignet/SendOtp/SendOtpResult" } }, inputTemplate=esignet/AuthenticateUser/AuthenticateUser, outputTemplate=esignet/AuthenticateUser/AuthenticateUserResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Authenticate user with 2nd Otp and valid details VID, uniqueIdentifier=TC_ESignet_AuthenticateUser_04, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.PostWithAutogenIdWithOtpGenerate.test(PostWithAutogenIdWithOtpGenerate.java:98)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_AuthenticateUserIDP_Vid_Diff_AuthFactorType_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PostWithAutogenIdWithOtpGenerate |
| Testcase Input |
| testCaseName=ESignet_AuthenticateUserIDP_Vid_Diff_AuthFactorType_Neg, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_vid_Other_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_vid_Other_Valid_Smoke_sid_transactionId$", "individualId": "$ID:Generate_Perpetual_VID_Invalid_Scen_Valid_Smoke_sid_vid$", "authFactorType" : "bio", "challenge" : "$ID:AddIdentity_Invalid_Scen_smoke_Pos_EMAIL$", "sendOtp":{ "encodedHash": "$ID:OAuthDetailsRequest_vid_Other_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_vid_Other_Valid_Smoke_sid_transactionId$", "individualId": "$ID:Generate_Perpetual_VID_Invalid_Scen_Valid_Smoke_sid_vid$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendOtp/SendOtp", "sendOtpEndPoint": "/v1/esignet/authorization/send-otp" } }, output={ "errors": [ { "errorCode": "invalid_auth_factor_type" } ], "sendOtpResp":{ "sendOtpResTemplate":"esignet/SendOtp/SendOtpResult" } }, inputTemplate=esignet/AuthenticateUser/AuthenticateUser, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=invalid_challenge_length,invalid_auth_factor_type_format,invalid_challenge_format, kycFields=null, description=Authenticate user with different AuthFactorType VID, uniqueIdentifier=TC_ESignet_AuthenticateUser_49, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.PostWithAutogenIdWithOtpGenerate.test(PostWithAutogenIdWithOtpGenerate.java:98)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_AuthenticateUserIDP_Vid_Diff_RequestTime_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PostWithAutogenIdWithOtpGenerate |
| Testcase Input |
| testCaseName=ESignet_AuthenticateUserIDP_Vid_Diff_RequestTime_Neg, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_vid_Other_Valid_Smoke_sid_encodedResp$", "requestTime": "2022-11-07T06:51:30.195Z", "transactionId": "$ID:OAuthDetailsRequest_vid_Other_Valid_Smoke_sid_transactionId$", "individualId": "$ID:Generate_Perpetual_VID_Invalid_Scen_Valid_Smoke_sid_vid$", "authFactorType" : "OTP", "challenge" : "$ID:AddIdentity_Invalid_Scen_smoke_Pos_EMAIL$", "sendOtp":{ "encodedHash": "$ID:OAuthDetailsRequest_vid_Other_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_vid_Other_Valid_Smoke_sid_transactionId$", "individualId": "$ID:Generate_Perpetual_VID_Invalid_Scen_Valid_Smoke_sid_vid$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendOtp/SendOtp", "sendOtpEndPoint": "/v1/esignet/authorization/send-otp" } }, output={ "errors": [ { "errorCode": "invalid_request" } ], "sendOtpResp":{ "sendOtpResTemplate":"esignet/SendOtp/SendOtpResult" } }, inputTemplate=esignet/AuthenticateUser/AuthenticateUser, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Authenticate user with different requestTime VID, uniqueIdentifier=TC_ESignet_AuthenticateUser_34, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.PostWithAutogenIdWithOtpGenerate.test(PostWithAutogenIdWithOtpGenerate.java:98)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_AuthenticateUserIDP_Vid_Empty_AuthFactorType_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PostWithAutogenIdWithOtpGenerate |
| Testcase Input |
| testCaseName=ESignet_AuthenticateUserIDP_Vid_Empty_AuthFactorType_Neg, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_vid_Other_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_vid_Other_Valid_Smoke_sid_transactionId$", "individualId": "$ID:Generate_Perpetual_VID_Invalid_Scen_Valid_Smoke_sid_vid$", "authFactorType" : "", "challenge" : "$ID:AddIdentity_Invalid_Scen_smoke_Pos_EMAIL$", "sendOtp":{ "encodedHash": "$ID:OAuthDetailsRequest_vid_Other_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_vid_Other_Valid_Smoke_sid_transactionId$", "individualId": "$ID:Generate_Perpetual_VID_Invalid_Scen_Valid_Smoke_sid_vid$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendOtp/SendOtp", "sendOtpEndPoint": "/v1/esignet/authorization/send-otp" } }, output={ "errors": [ { "errorCode": "invalid_auth_factor_type" } ], "sendOtpResp":{ "sendOtpResTemplate":"esignet/SendOtp/SendOtpResult" } }, inputTemplate=esignet/AuthenticateUser/AuthenticateUser, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=invalid_auth_factor_type, kycFields=null, description=Authenticate user with empty value in AuthFactorType VID, uniqueIdentifier=TC_ESignet_AuthenticateUser_47, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.PostWithAutogenIdWithOtpGenerate.test(PostWithAutogenIdWithOtpGenerate.java:98)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_AuthenticateUserIDP_Vid_Empty_Challenge_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PostWithAutogenIdWithOtpGenerate |
| Testcase Input |
| testCaseName=ESignet_AuthenticateUserIDP_Vid_Empty_Challenge_Neg, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_vid_Other_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_vid_Other_Valid_Smoke_sid_transactionId$", "individualId": "$ID:Generate_Perpetual_VID_Invalid_Scen_Valid_Smoke_sid_vid$", "authFactorType" : "OTP", "challenge" : "", "sendOtp":{ "encodedHash": "$ID:OAuthDetailsRequest_vid_Other_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_vid_Other_Valid_Smoke_sid_transactionId$", "individualId": "$ID:Generate_Perpetual_VID_Invalid_Scen_Valid_Smoke_sid_vid$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendOtp/SendOtp", "sendOtpEndPoint": "/v1/esignet/authorization/send-otp" } }, output={ "errors": [ { "errorCode": "invalid_challenge" } ], "sendOtpResp":{ "sendOtpResTemplate":"esignet/SendOtp/SendOtpResult" } }, inputTemplate=esignet/AuthenticateUser/AuthenticateUser, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=invalid_challenge, kycFields=null, description=Authenticate user with empty value in challenge VID, uniqueIdentifier=TC_ESignet_AuthenticateUser_52, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.PostWithAutogenIdWithOtpGenerate.test(PostWithAutogenIdWithOtpGenerate.java:98)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_AuthenticateUserIDP_Vid_Empty_IndividualId_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PostWithAutogenIdWithOtpGenerate |
| Testcase Input |
| testCaseName=ESignet_AuthenticateUserIDP_Vid_Empty_IndividualId_Neg, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_vid_Other_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_vid_Other_Valid_Smoke_sid_transactionId$", "individualId": "", "authFactorType" : "OTP", "challenge" : "$ID:AddIdentity_Invalid_Scen_smoke_Pos_EMAIL$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "encodedHash": "$ID:OAuthDetailsRequest_vid_Other_Valid_Smoke_sid_encodedResp$", "transactionId": "$ID:OAuthDetailsRequest_vid_Other_Valid_Smoke_sid_transactionId$", "individualId": "$ID:Generate_Perpetual_VID_Invalid_Scen_Valid_Smoke_sid_vid$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendOtp/SendOtp", "sendOtpEndPoint": "/v1/esignet/authorization/send-otp" } }, output={ "errors": [ { "errorCode": "invalid_identifier" } ], "sendOtpResp":{ "sendOtpResTemplate":"esignet/SendOtp/SendOtpResult" } }, inputTemplate=esignet/AuthenticateUser/AuthenticateUser, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Authenticate user with empty value in individualId VID, uniqueIdentifier=TC_ESignet_AuthenticateUser_43, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.PostWithAutogenIdWithOtpGenerate.test(PostWithAutogenIdWithOtpGenerate.java:98)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_AuthenticateUserIDP_Vid_Empty_TransactionId_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PostWithAutogenIdWithOtpGenerate |
| Testcase Input |
| testCaseName=ESignet_AuthenticateUserIDP_Vid_Empty_TransactionId_Neg, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_vid_Other_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "", "individualId": "$ID:Generate_Perpetual_VID_Invalid_Scen_Valid_Smoke_sid_vid$", "authFactorType" : "OTP", "challenge" : "$ID:AddIdentity_Invalid_Scen_smoke_Pos_EMAIL$", "sendOtp":{ "encodedHash": "$ID:OAuthDetailsRequest_vid_Other_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_vid_Other_Valid_Smoke_sid_transactionId$", "individualId": "$ID:Generate_Perpetual_VID_Invalid_Scen_Valid_Smoke_sid_vid$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendOtp/SendOtp", "sendOtpEndPoint": "/v1/esignet/authorization/send-otp" } }, output={ "errors": [ { "errorCode": "invalid_transaction" } ], "sendOtpResp":{ "sendOtpResTemplate":"esignet/SendOtp/SendOtpResult" } }, inputTemplate=esignet/AuthenticateUser/AuthenticateUser, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Authenticate user with empty value in transactionId VID, uniqueIdentifier=TC_ESignet_AuthenticateUser_39, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.PostWithAutogenIdWithOtpGenerate.test(PostWithAutogenIdWithOtpGenerate.java:98)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_AuthenticateUserIDP_Vid_Expired_TransactionId_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PostWithAutogenIdWithOtpGenerate |
| Testcase Input |
| testCaseName=ESignet_AuthenticateUserIDP_Vid_Expired_TransactionId_Neg, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_vid_Other_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "eZJZ0j3EeZJ_d9CsSakCoA0-Trbm6fOECY6J_q3dZtc", "individualId": "$ID:Generate_Perpetual_VID_Invalid_Scen_Valid_Smoke_sid_vid$", "authFactorType" : "OTP", "challenge" : "$ID:AddIdentity_Invalid_Scen_smoke_Pos_EMAIL$", "sendOtp":{ "encodedHash": "$ID:OAuthDetailsRequest_vid_Other_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_vid_Other_Valid_Smoke_sid_transactionId$", "individualId": "$ID:Generate_Perpetual_VID_Invalid_Scen_Valid_Smoke_sid_vid$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendOtp/SendOtp", "sendOtpEndPoint": "/v1/esignet/authorization/send-otp" } }, output={ "errors": [ { "errorCode": "invalid_transaction" } ], "sendOtpResp":{ "sendOtpResTemplate":"esignet/SendOtp/SendOtpResult" } }, inputTemplate=esignet/AuthenticateUser/AuthenticateUser, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Authenticate user with expired transactionId VID, uniqueIdentifier=TC_ESignet_AuthenticateUser_37, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.PostWithAutogenIdWithOtpGenerate.test(PostWithAutogenIdWithOtpGenerate.java:98)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_AuthenticateUserIDP_Vid_Future_RequestTime_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PostWithAutogenIdWithOtpGenerate |
| Testcase Input |
| testCaseName=ESignet_AuthenticateUserIDP_Vid_Future_RequestTime_Neg, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_vid_Other_Valid_Smoke_sid_encodedResp$", "requestTime": "2033-11-07T06:51:30.195Z", "transactionId": "$ID:OAuthDetailsRequest_vid_Other_Valid_Smoke_sid_transactionId$", "individualId": "$ID:Generate_Perpetual_VID_Invalid_Scen_Valid_Smoke_sid_vid$", "authFactorType" : "OTP", "challenge" : "$ID:AddIdentity_Invalid_Scen_smoke_Pos_EMAIL$", "sendOtp":{ "encodedHash": "$ID:OAuthDetailsRequest_vid_Other_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_vid_Other_Valid_Smoke_sid_transactionId$", "individualId": "$ID:Generate_Perpetual_VID_Invalid_Scen_Valid_Smoke_sid_vid$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendOtp/SendOtp", "sendOtpEndPoint": "/v1/esignet/authorization/send-otp" } }, output={ "errors": [ { "errorCode": "invalid_request" } ], "sendOtpResp":{ "sendOtpResTemplate":"esignet/SendOtp/SendOtpResult" } }, inputTemplate=esignet/AuthenticateUser/AuthenticateUser, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Authenticate user with future requestTime VID, uniqueIdentifier=TC_ESignet_AuthenticateUser_35, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.PostWithAutogenIdWithOtpGenerate.test(PostWithAutogenIdWithOtpGenerate.java:98)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_AuthenticateUserIDP_Vid_Invalid_AuthFactorType_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PostWithAutogenIdWithOtpGenerate |
| Testcase Input |
| testCaseName=ESignet_AuthenticateUserIDP_Vid_Invalid_AuthFactorType_Neg, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_vid_Other_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_vid_Other_Valid_Smoke_sid_transactionId$", "individualId": "$ID:Generate_Perpetual_VID_Invalid_Scen_Valid_Smoke_sid_vid$", "authFactorType" : "#$%FDF", "challenge" : "$ID:AddIdentity_Invalid_Scen_smoke_Pos_EMAIL$", "sendOtp":{ "encodedHash": "$ID:OAuthDetailsRequest_vid_Other_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_vid_Other_Valid_Smoke_sid_transactionId$", "individualId": "$ID:Generate_Perpetual_VID_Invalid_Scen_Valid_Smoke_sid_vid$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendOtp/SendOtp", "sendOtpEndPoint": "/v1/esignet/authorization/send-otp" } }, output={ "errors": [ { "errorCode": "invalid_auth_factor_type" } ], "sendOtpResp":{ "sendOtpResTemplate":"esignet/SendOtp/SendOtpResult" } }, inputTemplate=esignet/AuthenticateUser/AuthenticateUser, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=invalid_challenge_length,invalid_auth_factor_type, kycFields=null, description=Authenticate user with invalid AuthFactorType VID, uniqueIdentifier=TC_ESignet_AuthenticateUser_45, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.PostWithAutogenIdWithOtpGenerate.test(PostWithAutogenIdWithOtpGenerate.java:98)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_AuthenticateUserIDP_Vid_Invalid_Challenge_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PostWithAutogenIdWithOtpGenerate |
| Testcase Input |
| testCaseName=ESignet_AuthenticateUserIDP_Vid_Invalid_Challenge_Neg, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_vid_Other_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_vid_Other_Valid_Smoke_sid_transactionId$", "individualId": "$ID:Generate_Perpetual_VID_Invalid_Scen_Valid_Smoke_sid_vid$", "authFactorType" : "OTP", "challenge" : "23432", "sendOtp":{ "encodedHash": "$ID:OAuthDetailsRequest_vid_Other_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_vid_Other_Valid_Smoke_sid_transactionId$", "individualId": "$ID:Generate_Perpetual_VID_Invalid_Scen_Valid_Smoke_sid_vid$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendOtp/SendOtp", "sendOtpEndPoint": "/v1/esignet/authorization/send-otp" } }, output={ "errors": [ { "errorCode": "invalid_challenge" } ], "sendOtpResp":{ "sendOtpResTemplate":"esignet/SendOtp/SendOtpResult" } }, inputTemplate=esignet/AuthenticateUser/AuthenticateUser, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Authenticate user with invalid challenge VID, uniqueIdentifier=TC_ESignet_AuthenticateUser_50, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.PostWithAutogenIdWithOtpGenerate.test(PostWithAutogenIdWithOtpGenerate.java:98)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_AuthenticateUserIDP_Vid_Invalid_IndividualId_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PostWithAutogenIdWithOtpGenerate |
| Testcase Input |
| testCaseName=ESignet_AuthenticateUserIDP_Vid_Invalid_IndividualId_Neg, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_vid_Other_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_vid_Other_Valid_Smoke_sid_transactionId$", "individualId": "@#WE$#", "authFactorType" : "OTP", "challenge" : "$ID:AddIdentity_Invalid_Scen_smoke_Pos_EMAIL$", "sendOtp":{ "encodedHash": "$ID:OAuthDetailsRequest_vid_Other_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_vid_Other_Valid_Smoke_sid_transactionId$", "individualId": "$ID:Generate_Perpetual_VID_Invalid_Scen_Valid_Smoke_sid_vid$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendOtp/SendOtp", "sendOtpEndPoint": "/v1/esignet/authorization/send-otp" } }, output={ "errors": [ { "errorCode": "IDA-MLC-009" } ], "sendOtpResp":{ "sendOtpResTemplate":"esignet/SendOtp/SendOtpResult" } }, inputTemplate=esignet/AuthenticateUser/AuthenticateUser, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Authenticate user with invalid individualId VID, uniqueIdentifier=TC_ESignet_AuthenticateUser_41, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.PostWithAutogenIdWithOtpGenerate.test(PostWithAutogenIdWithOtpGenerate.java:98)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_AuthenticateUserIDP_Vid_Invalid_Otp_Challenge_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PostWithAutogenIdWithOtpGenerate |
| Testcase Input |
| testCaseName=ESignet_AuthenticateUserIDP_Vid_Invalid_Otp_Challenge_Neg, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_vid_Other_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_vid_Other_Valid_Smoke_sid_transactionId$", "individualId": "$ID:Generate_Perpetual_VID_Invalid_Scen_Valid_Smoke_sid_vid$", "authFactorType" : "OTP", "challenge" : "113453", "sendOtp":{ "encodedHash": "$ID:OAuthDetailsRequest_vid_Other_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_vid_Other_Valid_Smoke_sid_transactionId$", "individualId": "$ID:Generate_Perpetual_VID_Invalid_Scen_Valid_Smoke_sid_vid$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendOtp/SendOtp", "sendOtpEndPoint": "/v1/esignet/authorization/send-otp" } }, output={ "errors": [ { "errorCode": "IDA-OTA-004" } ], "sendOtpResp":{ "sendOtpResTemplate":"esignet/SendOtp/SendOtpResult" } }, inputTemplate=esignet/AuthenticateUser/AuthenticateUser, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Authenticate user with invalid Otp challenge VID, uniqueIdentifier=TC_ESignet_AuthenticateUser_54, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.PostWithAutogenIdWithOtpGenerate.test(PostWithAutogenIdWithOtpGenerate.java:98)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_AuthenticateUserIDP_Vid_Invalid_RequestTime_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PostWithAutogenIdWithOtpGenerate |
| Testcase Input |
| testCaseName=ESignet_AuthenticateUserIDP_Vid_Invalid_RequestTime_Neg, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_vid_Other_Valid_Smoke_sid_encodedResp$", "requestTime": "2022-11-07T06:51:30", "transactionId": "$ID:OAuthDetailsRequest_vid_Other_Valid_Smoke_sid_transactionId$", "individualId": "$ID:Generate_Perpetual_VID_Invalid_Scen_Valid_Smoke_sid_vid$", "authFactorType" : "OTP", "challenge" : "$ID:AddIdentity_Invalid_Scen_smoke_Pos_EMAIL$", "sendOtp":{ "encodedHash": "$ID:OAuthDetailsRequest_vid_Other_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_vid_Other_Valid_Smoke_sid_transactionId$", "individualId": "$ID:Generate_Perpetual_VID_Invalid_Scen_Valid_Smoke_sid_vid$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendOtp/SendOtp", "sendOtpEndPoint": "/v1/esignet/authorization/send-otp" } }, output={ "errors": [ { "errorCode": "invalid_request" } ], "sendOtpResp":{ "sendOtpResTemplate":"esignet/SendOtp/SendOtpResult" } }, inputTemplate=esignet/AuthenticateUser/AuthenticateUser, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Authenticate user with invalid requestTime VID, uniqueIdentifier=TC_ESignet_AuthenticateUser_33, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.PostWithAutogenIdWithOtpGenerate.test(PostWithAutogenIdWithOtpGenerate.java:98)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_AuthenticateUserIDP_Vid_Invalid_TransactionId_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PostWithAutogenIdWithOtpGenerate |
| Testcase Input |
| testCaseName=ESignet_AuthenticateUserIDP_Vid_Invalid_TransactionId_Neg, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_vid_Other_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "transactionId", "individualId": "$ID:Generate_Perpetual_VID_Invalid_Scen_Valid_Smoke_sid_vid$", "authFactorType" : "OTP", "challenge" : "$ID:AddIdentity_Invalid_Scen_smoke_Pos_EMAIL$", "sendOtp":{ "encodedHash": "$ID:OAuthDetailsRequest_vid_Other_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_vid_Other_Valid_Smoke_sid_transactionId$", "individualId": "$ID:Generate_Perpetual_VID_Invalid_Scen_Valid_Smoke_sid_vid$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendOtp/SendOtp", "sendOtpEndPoint": "/v1/esignet/authorization/send-otp" } }, output={ "errors": [ { "errorCode": "invalid_transaction" } ], "sendOtpResp":{ "sendOtpResTemplate":"esignet/SendOtp/SendOtpResult" } }, inputTemplate=esignet/AuthenticateUser/AuthenticateUser, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Authenticate user with invalid transactionId VID, uniqueIdentifier=TC_ESignet_AuthenticateUser_36, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.PostWithAutogenIdWithOtpGenerate.test(PostWithAutogenIdWithOtpGenerate.java:98)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_AuthenticateUserIDP_Vid_Missing_AuthFactorType_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PostWithAutogenIdWithOtpGenerate |
| Testcase Input |
| testCaseName=ESignet_AuthenticateUserIDP_Vid_Missing_AuthFactorType_Neg, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_vid_Other_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_vid_Other_Valid_Smoke_sid_transactionId$", "individualId": "$ID:Generate_Perpetual_VID_Invalid_Scen_Valid_Smoke_sid_vid$", "authFactorType" : "$REMOVE$", "challenge" : "$ID:AddIdentity_Invalid_Scen_smoke_Pos_EMAIL$", "sendOtp":{ "encodedHash": "$ID:OAuthDetailsRequest_vid_Other_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_vid_Other_Valid_Smoke_sid_transactionId$", "individualId": "$ID:Generate_Perpetual_VID_Invalid_Scen_Valid_Smoke_sid_vid$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendOtp/SendOtp", "sendOtpEndPoint": "/v1/esignet/authorization/send-otp" } }, output={ "errors": [ { "errorCode": "invalid_auth_factor_type" } ], "sendOtpResp":{ "sendOtpResTemplate":"esignet/SendOtp/SendOtpResult" } }, inputTemplate=esignet/AuthenticateUser/AuthenticateUser, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=invalid_auth_factor_type, kycFields=null, description=Authenticate user without AuthFactorType VID, uniqueIdentifier=TC_ESignet_AuthenticateUser_46, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.PostWithAutogenIdWithOtpGenerate.test(PostWithAutogenIdWithOtpGenerate.java:98)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_AuthenticateUserIDP_Vid_Missing_Challenge_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PostWithAutogenIdWithOtpGenerate |
| Testcase Input |
| testCaseName=ESignet_AuthenticateUserIDP_Vid_Missing_Challenge_Neg, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_vid_Other_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_vid_Other_Valid_Smoke_sid_transactionId$", "individualId": "$ID:Generate_Perpetual_VID_Invalid_Scen_Valid_Smoke_sid_vid$", "authFactorType" : "OTP", "challenge" : "$REMOVE$", "sendOtp":{ "encodedHash": "$ID:OAuthDetailsRequest_vid_Other_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_vid_Other_Valid_Smoke_sid_transactionId$", "individualId": "$ID:Generate_Perpetual_VID_Invalid_Scen_Valid_Smoke_sid_vid$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendOtp/SendOtp", "sendOtpEndPoint": "/v1/esignet/authorization/send-otp" } }, output={ "errors": [ { "errorCode": "invalid_challenge" } ], "sendOtpResp":{ "sendOtpResTemplate":"esignet/SendOtp/SendOtpResult" } }, inputTemplate=esignet/AuthenticateUser/AuthenticateUser, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=invalid_challenge, kycFields=null, description=Authenticate user without challenge VID, uniqueIdentifier=TC_ESignet_AuthenticateUser_51, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.PostWithAutogenIdWithOtpGenerate.test(PostWithAutogenIdWithOtpGenerate.java:98)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_AuthenticateUserIDP_Vid_Missing_IndividualId_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PostWithAutogenIdWithOtpGenerate |
| Testcase Input |
| testCaseName=ESignet_AuthenticateUserIDP_Vid_Missing_IndividualId_Neg, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_vid_Other_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_vid_Other_Valid_Smoke_sid_transactionId$", "individualId": "$REMOVE$", "authFactorType" : "OTP", "challenge" : "$ID:AddIdentity_Invalid_Scen_smoke_Pos_EMAIL$", "sendOtp":{ "encodedHash": "$ID:OAuthDetailsRequest_vid_Other_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_vid_Other_Valid_Smoke_sid_transactionId$", "individualId": "$ID:Generate_Perpetual_VID_Invalid_Scen_Valid_Smoke_sid_vid$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendOtp/SendOtp", "sendOtpEndPoint": "/v1/esignet/authorization/send-otp" } }, output={ "errors": [ { "errorCode": "invalid_identifier" } ], "sendOtpResp":{ "sendOtpResTemplate":"esignet/SendOtp/SendOtpResult" } }, inputTemplate=esignet/AuthenticateUser/AuthenticateUser, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Authenticate user without individualId VID, uniqueIdentifier=TC_ESignet_AuthenticateUser_42, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.PostWithAutogenIdWithOtpGenerate.test(PostWithAutogenIdWithOtpGenerate.java:98)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_AuthenticateUserIDP_Vid_Missing_TransactionId_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PostWithAutogenIdWithOtpGenerate |
| Testcase Input |
| testCaseName=ESignet_AuthenticateUserIDP_Vid_Missing_TransactionId_Neg, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_vid_Other_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$REMOVE$", "individualId": "$ID:Generate_Perpetual_VID_Invalid_Scen_Valid_Smoke_sid_vid$", "authFactorType" : "OTP", "challenge" : "$ID:AddIdentity_Invalid_Scen_smoke_Pos_EMAIL$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "encodedHash": "$ID:OAuthDetailsRequest_vid_Other_Valid_Smoke_sid_encodedResp$", "transactionId": "$ID:OAuthDetailsRequest_vid_Other_Valid_Smoke_sid_transactionId$", "individualId": "$ID:Generate_Perpetual_VID_Invalid_Scen_Valid_Smoke_sid_vid$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendOtp/SendOtp", "sendOtpEndPoint": "/v1/esignet/authorization/send-otp" } }, output={ "errors": [ { "errorCode": "invalid_transaction" } ], "sendOtpResp":{ "sendOtpResTemplate":"esignet/SendOtp/SendOtpResult" } }, inputTemplate=esignet/AuthenticateUser/AuthenticateUser, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Authenticate user without transactionId VID, uniqueIdentifier=TC_ESignet_AuthenticateUser_38, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.PostWithAutogenIdWithOtpGenerate.test(PostWithAutogenIdWithOtpGenerate.java:98)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_AuthenticateUserIDP_Vid_Null_AuthFactorType_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PostWithAutogenIdWithOtpGenerate |
| Testcase Input |
| testCaseName=ESignet_AuthenticateUserIDP_Vid_Null_AuthFactorType_Neg, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_vid_Other_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_vid_Other_Valid_Smoke_sid_transactionId$", "individualId": "$ID:Generate_Perpetual_VID_Invalid_Scen_Valid_Smoke_sid_vid$", "authFactorType" : "null", "challenge" : "$ID:AddIdentity_Invalid_Scen_smoke_Pos_EMAIL$", "sendOtp":{ "encodedHash": "$ID:OAuthDetailsRequest_vid_Other_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_vid_Other_Valid_Smoke_sid_transactionId$", "individualId": "$ID:Generate_Perpetual_VID_Invalid_Scen_Valid_Smoke_sid_vid$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendOtp/SendOtp", "sendOtpEndPoint": "/v1/esignet/authorization/send-otp" } }, output={ "errors": [ { "errorCode": "invalid_auth_factor_type" } ], "sendOtpResp":{ "sendOtpResTemplate":"esignet/SendOtp/SendOtpResult" } }, inputTemplate=esignet/AuthenticateUser/AuthenticateUser, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=invalid_challenge_length,invalid_auth_factor_type, kycFields=null, description=Authenticate user with Null in AuthFactorType VID, uniqueIdentifier=TC_ESignet_AuthenticateUser_48, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.PostWithAutogenIdWithOtpGenerate.test(PostWithAutogenIdWithOtpGenerate.java:98)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_AuthenticateUserIDP_Vid_Null_Challenge_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PostWithAutogenIdWithOtpGenerate |
| Testcase Input |
| testCaseName=ESignet_AuthenticateUserIDP_Vid_Null_Challenge_Neg, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_vid_Other_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_vid_Other_Valid_Smoke_sid_transactionId$", "individualId": "$ID:Generate_Perpetual_VID_Invalid_Scen_Valid_Smoke_sid_vid$", "authFactorType" : "OTP", "challenge" : "null", "sendOtp":{ "encodedHash": "$ID:OAuthDetailsRequest_vid_Other_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_vid_Other_Valid_Smoke_sid_transactionId$", "individualId": "$ID:Generate_Perpetual_VID_Invalid_Scen_Valid_Smoke_sid_vid$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendOtp/SendOtp", "sendOtpEndPoint": "/v1/esignet/authorization/send-otp" } }, output={ "errors": [ { "errorCode": "invalid_challenge" } ], "sendOtpResp":{ "sendOtpResTemplate":"esignet/SendOtp/SendOtpResult" } }, inputTemplate=esignet/AuthenticateUser/AuthenticateUser, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=invalid_challenge_length,invalid_challenge, kycFields=null, description=Authenticate user with Null in challenge VID, uniqueIdentifier=TC_ESignet_AuthenticateUser_53, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.PostWithAutogenIdWithOtpGenerate.test(PostWithAutogenIdWithOtpGenerate.java:98)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_AuthenticateUserIDP_Vid_Null_IndividualId_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PostWithAutogenIdWithOtpGenerate |
| Testcase Input |
| testCaseName=ESignet_AuthenticateUserIDP_Vid_Null_IndividualId_Neg, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_vid_Other_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_vid_Other_Valid_Smoke_sid_transactionId$", "individualId": "null", "authFactorType" : "OTP", "challenge" : "$ID:AddIdentity_Invalid_Scen_smoke_Pos_EMAIL$", "sendOtp":{ "encodedHash": "$ID:OAuthDetailsRequest_vid_Other_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_vid_Other_Valid_Smoke_sid_transactionId$", "individualId": "$ID:Generate_Perpetual_VID_Invalid_Scen_Valid_Smoke_sid_vid$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendOtp/SendOtp", "sendOtpEndPoint": "/v1/esignet/authorization/send-otp" } }, output={ "errors": [ { "errorCode": "IDA-MLC-009" } ], "sendOtpResp":{ "sendOtpResTemplate":"esignet/SendOtp/SendOtpResult" } }, inputTemplate=esignet/AuthenticateUser/AuthenticateUser, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Authenticate user with Null in individualId VID, uniqueIdentifier=TC_ESignet_AuthenticateUser_44, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.PostWithAutogenIdWithOtpGenerate.test(PostWithAutogenIdWithOtpGenerate.java:98)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_AuthenticateUserIDP_Vid_Null_TransactionId_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PostWithAutogenIdWithOtpGenerate |
| Testcase Input |
| testCaseName=ESignet_AuthenticateUserIDP_Vid_Null_TransactionId_Neg, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_vid_Other_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "null", "individualId": "$ID:Generate_Perpetual_VID_Invalid_Scen_Valid_Smoke_sid_vid$", "authFactorType" : "OTP", "challenge" : "$ID:AddIdentity_Invalid_Scen_smoke_Pos_EMAIL$", "sendOtp":{ "encodedHash": "$ID:OAuthDetailsRequest_vid_Other_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_vid_Other_Valid_Smoke_sid_transactionId$", "individualId": "$ID:Generate_Perpetual_VID_Invalid_Scen_Valid_Smoke_sid_vid$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendOtp/SendOtp", "sendOtpEndPoint": "/v1/esignet/authorization/send-otp" } }, output={ "errors": [ { "errorCode": "invalid_transaction" } ], "sendOtpResp":{ "sendOtpResTemplate":"esignet/SendOtp/SendOtpResult" } }, inputTemplate=esignet/AuthenticateUser/AuthenticateUser, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Authenticate user with Null in transactionId VID, uniqueIdentifier=TC_ESignet_AuthenticateUser_40, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.PostWithAutogenIdWithOtpGenerate.test(PostWithAutogenIdWithOtpGenerate.java:98)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_AuthenticateUserIDP_Consent_uin_Otp_Same_Claims |
| Testcase Dependency |
| [Dependent_Idrepo_AddIdentity_16, TC_ESignet_OAuthDetailsRequest_04, TC_ESignet_CreateOIDCClient_01] |
| Class Name |
| PostWithAutogenIdWithOtpGenerate |
| Testcase Input |
| testCaseName=ESignet_AuthenticateUserIDP_Consent_uin_Otp_Same_Claims, endPoint=/v1/esignet/authorization/v2/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_Consent_2nd_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_Consent_2nd_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_Consent_smoke_Pos_UIN$", "authFactorType" : "OTP", "challenge" : "$ID:AddIdentity_Consent_smoke_Pos_EMAIL$", "sendOtp":{ "encodedHash": "$ID:OAuthDetailsRequest_Consent_2nd_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_Consent_2nd_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_Consent_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendOtp/SendOtp", "sendOtpEndPoint": "/v1/esignet/authorization/send-otp" } }, output={ "consentAction": "NOCAPTURE", "sendOtpResp":{ "sendOtpResTemplate":"esignet/SendOtp/SendOtpResult" } }, inputTemplate=esignet/Consent/AuthenticateUserConsent/AuthenticateUserConsent, outputTemplate=esignet/Consent/AuthenticateUserConsent/AuthenticateUserConsentResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Authenticate user consent with Otp and same claims UIN, uniqueIdentifier=TC_ESignet_AuthenticateUser_03, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_AuthenticateUserIDP_uin_2_Otp_UnAuthenticated_Neg |
| Testcase Dependency |
| [Dependent_Idrepo_AddIdentity_02, TC_ESignet_OAuthDetailsRequest_08, TC_ESignet_CreateOIDCClient_01, TC_ESignet_OAuthDetailsRequest_34] |
| Class Name |
| PostWithAutogenIdWithOtpGenerate |
| Testcase Input |
| testCaseName=ESignet_AuthenticateUserIDP_uin_2_Otp_UnAuthenticated_Neg, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_2_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_2_all_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_Valid_Parameters_Sce2_smoke_Pos_UIN$", "authFactorType" : "OTP", "challenge" : "$ID:AddIdentity_Valid_Parameters_Sce2_smoke_Pos_EMAIL$", "sendOtp":{ "encodedHash": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_Valid_Parameters_Sce2_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendOtp/SendOtp", "sendOtpEndPoint": "/v1/esignet/authorization/send-otp" } }, output={ "errors": [ { "errorCode": "IDA-OTA-005" } ], "sendOtpResp":{ "sendOtpResTemplate":"esignet/SendOtp/SendOtpResult" } }, inputTemplate=esignet/AuthenticateUser/AuthenticateUser, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=IDA-OTA-005,invalid_transaction, kycFields=null, description=Send authenticate request with unauthenticated transactionId UIN, uniqueIdentifier=TC_ESignet_AuthenticateUser_08, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_AuthenticateUserIDP_uin_2nd_Otp_Valid_Smoke |
| Testcase Dependency |
| [Dependent_Idrepo_AddIdentity_01, TC_ESignet_OAuthDetailsRequest_02, TC_ESignet_CreateOIDCClient_01] |
| Class Name |
| PostWithAutogenIdWithOtpGenerate |
| Testcase Input |
| testCaseName=ESignet_AuthenticateUserIDP_uin_2nd_Otp_Valid_Smoke, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_2nd_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_2nd_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_Valid_Parameters_smoke_Pos_UIN$", "authFactorType" : "OTP", "challenge" : "$ID:AddIdentity_Valid_Parameters_smoke_Pos_EMAIL$", "sendOtp":{ "encodedHash": "$ID:OAuthDetailsRequest_2nd_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_2nd_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_Valid_Parameters_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendOtp/SendOtp", "sendOtpEndPoint": "/v1/esignet/authorization/send-otp" } }, output={ "sendOtpResp":{ "sendOtpResTemplate":"esignet/SendOtp/SendOtpResult" } }, inputTemplate=esignet/AuthenticateUser/AuthenticateUser, outputTemplate=esignet/AuthenticateUser/AuthenticateUserResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Authenticate user with 2nd Otp UIN, uniqueIdentifier=TC_ESignet_AuthenticateUser_02, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_AuthenticateUserIDP_uin_Diff_AuthFactorType_Neg |
| Testcase Dependency |
| [Dependent_Idrepo_AddIdentity_03, TC_ESignet_OAuthDetailsRequest_08, TC_ESignet_CreateOIDCClient_01] |
| Class Name |
| PostWithAutogenIdWithOtpGenerate |
| Testcase Input |
| testCaseName=ESignet_AuthenticateUserIDP_uin_Diff_AuthFactorType_Neg, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_Invalid_Scen_smoke_Pos_UIN$", "authFactorType" : "bio", "challenge" : "$ID:AddIdentity_Invalid_Scen_smoke_Pos_EMAIL$", "sendOtp":{ "encodedHash": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_Invalid_Scen_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendOtp/SendOtp", "sendOtpEndPoint": "/v1/esignet/authorization/send-otp" } }, output={ "errors": [ { "errorCode": "invalid_auth_factor_type" } ], "sendOtpResp":{ "sendOtpResTemplate":"esignet/SendOtp/SendOtpResult" } }, inputTemplate=esignet/AuthenticateUser/AuthenticateUser, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=invalid_challenge_length,invalid_challenge_format, kycFields=null, description=Authenticate user with different AuthFactorType UIN, uniqueIdentifier=TC_ESignet_AuthenticateUser_25, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_AuthenticateUserIDP_uin_Diff_RequestTime_Neg |
| Testcase Dependency |
| [Dependent_Idrepo_AddIdentity_03, TC_ESignet_OAuthDetailsRequest_08, TC_ESignet_CreateOIDCClient_01] |
| Class Name |
| PostWithAutogenIdWithOtpGenerate |
| Testcase Input |
| testCaseName=ESignet_AuthenticateUserIDP_uin_Diff_RequestTime_Neg, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_encodedResp$", "requestTime": "2022-11-07T06:51:30.195Z", "transactionId": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_Invalid_Scen_smoke_Pos_UIN$", "authFactorType" : "OTP", "challenge" : "$ID:AddIdentity_Invalid_Scen_smoke_Pos_EMAIL$", "sendOtp":{ "encodedHash": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_Invalid_Scen_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendOtp/SendOtp", "sendOtpEndPoint": "/v1/esignet/authorization/send-otp" } }, output={ "errors": [ { "errorCode": "invalid_request" } ], "sendOtpResp":{ "sendOtpResTemplate":"esignet/SendOtp/SendOtpResult" } }, inputTemplate=esignet/AuthenticateUser/AuthenticateUser, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Authenticate user with different requestTime UIN, uniqueIdentifier=TC_ESignet_AuthenticateUser_10, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_AuthenticateUserIDP_uin_Empty_AuthFactorType_Neg |
| Testcase Dependency |
| [Dependent_Idrepo_AddIdentity_03, TC_ESignet_OAuthDetailsRequest_08, TC_ESignet_CreateOIDCClient_01] |
| Class Name |
| PostWithAutogenIdWithOtpGenerate |
| Testcase Input |
| testCaseName=ESignet_AuthenticateUserIDP_uin_Empty_AuthFactorType_Neg, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_Invalid_Scen_smoke_Pos_UIN$", "authFactorType" : "", "challenge" : "$ID:AddIdentity_Invalid_Scen_smoke_Pos_EMAIL$", "sendOtp":{ "encodedHash": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_Invalid_Scen_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendOtp/SendOtp", "sendOtpEndPoint": "/v1/esignet/authorization/send-otp" } }, output={ "errors": [ { "errorCode": "invalid_auth_factor_type" } ], "sendOtpResp":{ "sendOtpResTemplate":"esignet/SendOtp/SendOtpResult" } }, inputTemplate=esignet/AuthenticateUser/AuthenticateUser, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=invalid_auth_factor_type, kycFields=null, description=Authenticate user with empty value in AuthFactorType UIN, uniqueIdentifier=TC_ESignet_AuthenticateUser_23, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_AuthenticateUserIDP_uin_Empty_Challenge_Neg |
| Testcase Dependency |
| [Dependent_Idrepo_AddIdentity_03, TC_ESignet_OAuthDetailsRequest_08, TC_ESignet_CreateOIDCClient_01] |
| Class Name |
| PostWithAutogenIdWithOtpGenerate |
| Testcase Input |
| testCaseName=ESignet_AuthenticateUserIDP_uin_Empty_Challenge_Neg, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_Invalid_Scen_smoke_Pos_UIN$", "authFactorType" : "OTP", "challenge" : "", "sendOtp":{ "encodedHash": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_Invalid_Scen_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendOtp/SendOtp", "sendOtpEndPoint": "/v1/esignet/authorization/send-otp" } }, output={ "errors": [ { "errorCode": "invalid_challenge" } ], "sendOtpResp":{ "sendOtpResTemplate":"esignet/SendOtp/SendOtpResult" } }, inputTemplate=esignet/AuthenticateUser/AuthenticateUser, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=invalid_challenge, kycFields=null, description=Authenticate user with empty value in challenge UIN, uniqueIdentifier=TC_ESignet_AuthenticateUser_28, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_AuthenticateUserIDP_uin_Empty_IndividualId_Neg |
| Testcase Dependency |
| [Dependent_Idrepo_AddIdentity_03, TC_ESignet_OAuthDetailsRequest_08, TC_ESignet_CreateOIDCClient_01] |
| Class Name |
| PostWithAutogenIdWithOtpGenerate |
| Testcase Input |
| testCaseName=ESignet_AuthenticateUserIDP_uin_Empty_IndividualId_Neg, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_transactionId$", "individualId": "", "authFactorType" : "OTP", "challenge" : "$ID:AddIdentity_Invalid_Scen_smoke_Pos_EMAIL$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "encodedHash": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_encodedResp$", "transactionId": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_Invalid_Scen_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendOtp/SendOtp", "sendOtpEndPoint": "/v1/esignet/authorization/send-otp" } }, output={ "errors": [ { "errorCode": "invalid_identifier" } ], "sendOtpResp":{ "sendOtpResTemplate":"esignet/SendOtp/SendOtpResult" } }, inputTemplate=esignet/AuthenticateUser/AuthenticateUser, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Authenticate user with empty value in individualId UIN, uniqueIdentifier=TC_ESignet_AuthenticateUser_19, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_AuthenticateUserIDP_uin_Empty_TransactionId_Neg |
| Testcase Dependency |
| [Dependent_Idrepo_AddIdentity_03, TC_ESignet_OAuthDetailsRequest_08, TC_ESignet_CreateOIDCClient_01] |
| Class Name |
| PostWithAutogenIdWithOtpGenerate |
| Testcase Input |
| testCaseName=ESignet_AuthenticateUserIDP_uin_Empty_TransactionId_Neg, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "", "individualId": "$ID:AddIdentity_Invalid_Scen_smoke_Pos_UIN$", "authFactorType" : "OTP", "challenge" : "$ID:AddIdentity_Invalid_Scen_smoke_Pos_EMAIL$", "sendOtp":{ "encodedHash": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_Invalid_Scen_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendOtp/SendOtp", "sendOtpEndPoint": "/v1/esignet/authorization/send-otp" } }, output={ "errors": [ { "errorCode": "invalid_transaction" } ], "sendOtpResp":{ "sendOtpResTemplate":"esignet/SendOtp/SendOtpResult" } }, inputTemplate=esignet/AuthenticateUser/AuthenticateUser, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Authenticate user with empty value in transactionId UIN, uniqueIdentifier=TC_ESignet_AuthenticateUser_15, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_AuthenticateUserIDP_uin_Expired_TransactionId_Neg |
| Testcase Dependency |
| [Dependent_Idrepo_AddIdentity_03, TC_ESignet_OAuthDetailsRequest_08, TC_ESignet_CreateOIDCClient_01] |
| Class Name |
| PostWithAutogenIdWithOtpGenerate |
| Testcase Input |
| testCaseName=ESignet_AuthenticateUserIDP_uin_Expired_TransactionId_Neg, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "eZJZ0j3EeZJ_d9CsSakCoA0-Trbm6fOECY6J_q3dZtc", "individualId": "$ID:AddIdentity_Invalid_Scen_smoke_Pos_UIN$", "authFactorType" : "OTP", "challenge" : "$ID:AddIdentity_Invalid_Scen_smoke_Pos_EMAIL$", "sendOtp":{ "encodedHash": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_Invalid_Scen_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendOtp/SendOtp", "sendOtpEndPoint": "/v1/esignet/authorization/send-otp" } }, output={ "errors": [ { "errorCode": "invalid_transaction" } ], "sendOtpResp":{ "sendOtpResTemplate":"esignet/SendOtp/SendOtpResult" } }, inputTemplate=esignet/AuthenticateUser/AuthenticateUser, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Authenticate user with expired transactionId UIN, uniqueIdentifier=TC_ESignet_AuthenticateUser_13, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_AuthenticateUserIDP_uin_Future_RequestTime_Neg |
| Testcase Dependency |
| [Dependent_Idrepo_AddIdentity_03, TC_ESignet_OAuthDetailsRequest_08, TC_ESignet_CreateOIDCClient_01] |
| Class Name |
| PostWithAutogenIdWithOtpGenerate |
| Testcase Input |
| testCaseName=ESignet_AuthenticateUserIDP_uin_Future_RequestTime_Neg, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_encodedResp$", "requestTime": "2033-11-07T06:51:30.195Z", "transactionId": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_Invalid_Scen_smoke_Pos_UIN$", "authFactorType" : "OTP", "challenge" : "$ID:AddIdentity_Invalid_Scen_smoke_Pos_EMAIL$", "sendOtp":{ "encodedHash": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_Invalid_Scen_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendOtp/SendOtp", "sendOtpEndPoint": "/v1/esignet/authorization/send-otp" } }, output={ "errors": [ { "errorCode": "invalid_request" } ], "sendOtpResp":{ "sendOtpResTemplate":"esignet/SendOtp/SendOtpResult" } }, inputTemplate=esignet/AuthenticateUser/AuthenticateUser, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Authenticate user with future requestTime UIN, uniqueIdentifier=TC_ESignet_AuthenticateUser_11, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_AuthenticateUserIDP_uin_Invalid_AuthFactorType_Neg |
| Testcase Dependency |
| [Dependent_Idrepo_AddIdentity_03, TC_ESignet_OAuthDetailsRequest_08, TC_ESignet_CreateOIDCClient_01] |
| Class Name |
| PostWithAutogenIdWithOtpGenerate |
| Testcase Input |
| testCaseName=ESignet_AuthenticateUserIDP_uin_Invalid_AuthFactorType_Neg, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_Invalid_Scen_smoke_Pos_UIN$", "authFactorType" : "#$%FDF", "challenge" : "$ID:AddIdentity_Invalid_Scen_smoke_Pos_EMAIL$", "sendOtp":{ "encodedHash": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_Invalid_Scen_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendOtp/SendOtp", "sendOtpEndPoint": "/v1/esignet/authorization/send-otp" } }, output={ "errors": [ { "errorCode": "invalid_auth_factor_type" } ], "sendOtpResp":{ "sendOtpResTemplate":"esignet/SendOtp/SendOtpResult" } }, inputTemplate=esignet/AuthenticateUser/AuthenticateUser, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=invalid_auth_factor_type, kycFields=null, description=Authenticate user with invalid AuthFactorType UIN, uniqueIdentifier=TC_ESignet_AuthenticateUser_21, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_AuthenticateUserIDP_uin_Invalid_Challenge_Neg |
| Testcase Dependency |
| [Dependent_Idrepo_AddIdentity_03, TC_ESignet_OAuthDetailsRequest_08, TC_ESignet_CreateOIDCClient_01] |
| Class Name |
| PostWithAutogenIdWithOtpGenerate |
| Testcase Input |
| testCaseName=ESignet_AuthenticateUserIDP_uin_Invalid_Challenge_Neg, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_Invalid_Scen_smoke_Pos_UIN$", "authFactorType" : "OTP", "challenge" : "23432", "sendOtp":{ "encodedHash": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_Invalid_Scen_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendOtp/SendOtp", "sendOtpEndPoint": "/v1/esignet/authorization/send-otp" } }, output={ "errors": [ { "errorCode": "invalid_challenge" } ], "sendOtpResp":{ "sendOtpResTemplate":"esignet/SendOtp/SendOtpResult" } }, inputTemplate=esignet/AuthenticateUser/AuthenticateUser, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=invalid_challenge,invalid_challenge_length, kycFields=null, description=Authenticate user with invalid challenge UIN, uniqueIdentifier=TC_ESignet_AuthenticateUser_26, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_AuthenticateUserIDP_uin_Invalid_IndividualId_Neg |
| Testcase Dependency |
| [Dependent_Idrepo_AddIdentity_03, TC_ESignet_OAuthDetailsRequest_08, TC_ESignet_CreateOIDCClient_01] |
| Class Name |
| PostWithAutogenIdWithOtpGenerate |
| Testcase Input |
| testCaseName=ESignet_AuthenticateUserIDP_uin_Invalid_IndividualId_Neg, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_transactionId$", "individualId": "@#WE$#", "authFactorType" : "OTP", "challenge" : "$ID:AddIdentity_Invalid_Scen_smoke_Pos_EMAIL$", "sendOtp":{ "encodedHash": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_Invalid_Scen_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendOtp/SendOtp", "sendOtpEndPoint": "/v1/esignet/authorization/send-otp" } }, output={ "errors": [ { "errorCode": "IDA-MLC-009" } ], "sendOtpResp":{ "sendOtpResTemplate":"esignet/SendOtp/SendOtpResult" } }, inputTemplate=esignet/AuthenticateUser/AuthenticateUser, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=IDA-MLC-009,invalid_individual_id, kycFields=null, description=Authenticate user with invalid individualId UIN, uniqueIdentifier=TC_ESignet_AuthenticateUser_17, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_AuthenticateUserIDP_uin_Invalid_Otp_Challenge_Neg |
| Testcase Dependency |
| [Dependent_Idrepo_AddIdentity_03, TC_ESignet_OAuthDetailsRequest_08, TC_ESignet_CreateOIDCClient_01] |
| Class Name |
| PostWithAutogenIdWithOtpGenerate |
| Testcase Input |
| testCaseName=ESignet_AuthenticateUserIDP_uin_Invalid_Otp_Challenge_Neg, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_Invalid_Scen_smoke_Pos_UIN$", "authFactorType" : "OTP", "challenge" : "113453", "sendOtp":{ "encodedHash": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_Invalid_Scen_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendOtp/SendOtp", "sendOtpEndPoint": "/v1/esignet/authorization/send-otp" } }, output={ "errors": [ { "errorCode": "IDA-OTA-004" } ], "sendOtpResp":{ "sendOtpResTemplate":"esignet/SendOtp/SendOtpResult" } }, inputTemplate=esignet/AuthenticateUser/AuthenticateUser, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=IDA-OTA-004,auth_failed, kycFields=null, description=Authenticate user with invalid Otp challenge UIN, uniqueIdentifier=TC_ESignet_AuthenticateUser_30, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_AuthenticateUserIDP_uin_Invalid_RequestTime_Neg |
| Testcase Dependency |
| [Dependent_Idrepo_AddIdentity_03, TC_ESignet_OAuthDetailsRequest_08, TC_ESignet_CreateOIDCClient_01] |
| Class Name |
| PostWithAutogenIdWithOtpGenerate |
| Testcase Input |
| testCaseName=ESignet_AuthenticateUserIDP_uin_Invalid_RequestTime_Neg, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_encodedResp$", "requestTime": "2022-11-07T06:51:30", "transactionId": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_Invalid_Scen_smoke_Pos_UIN$", "authFactorType" : "OTP", "challenge" : "$ID:AddIdentity_Invalid_Scen_smoke_Pos_EMAIL$", "sendOtp":{ "encodedHash": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_Invalid_Scen_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendOtp/SendOtp", "sendOtpEndPoint": "/v1/esignet/authorization/send-otp" } }, output={ "errors": [ { "errorCode": "invalid_request" } ], "sendOtpResp":{ "sendOtpResTemplate":"esignet/SendOtp/SendOtpResult" } }, inputTemplate=esignet/AuthenticateUser/AuthenticateUser, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Authenticate user with invalid requestTime UIN, uniqueIdentifier=TC_ESignet_AuthenticateUser_09, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_AuthenticateUserIDP_uin_Invalid_TransactionId_Neg |
| Testcase Dependency |
| [Dependent_Idrepo_AddIdentity_03, TC_ESignet_OAuthDetailsRequest_08, TC_ESignet_CreateOIDCClient_01] |
| Class Name |
| PostWithAutogenIdWithOtpGenerate |
| Testcase Input |
| testCaseName=ESignet_AuthenticateUserIDP_uin_Invalid_TransactionId_Neg, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "transactionId", "individualId": "$ID:AddIdentity_Invalid_Scen_smoke_Pos_UIN$", "authFactorType" : "OTP", "challenge" : "$ID:AddIdentity_Invalid_Scen_smoke_Pos_EMAIL$", "sendOtp":{ "encodedHash": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_Invalid_Scen_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendOtp/SendOtp", "sendOtpEndPoint": "/v1/esignet/authorization/send-otp" } }, output={ "errors": [ { "errorCode": "invalid_transaction" } ], "sendOtpResp":{ "sendOtpResTemplate":"esignet/SendOtp/SendOtpResult" } }, inputTemplate=esignet/AuthenticateUser/AuthenticateUser, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Authenticate user with invalid transactionId UIN, uniqueIdentifier=TC_ESignet_AuthenticateUser_12, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_AuthenticateUserIDP_uin_Missing_AuthFactorType_Neg |
| Testcase Dependency |
| [Dependent_Idrepo_AddIdentity_03, TC_ESignet_OAuthDetailsRequest_08, TC_ESignet_CreateOIDCClient_01] |
| Class Name |
| PostWithAutogenIdWithOtpGenerate |
| Testcase Input |
| testCaseName=ESignet_AuthenticateUserIDP_uin_Missing_AuthFactorType_Neg, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_Invalid_Scen_smoke_Pos_UIN$", "authFactorType" : "$REMOVE$", "challenge" : "$ID:AddIdentity_Invalid_Scen_smoke_Pos_EMAIL$", "sendOtp":{ "encodedHash": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_Invalid_Scen_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendOtp/SendOtp", "sendOtpEndPoint": "/v1/esignet/authorization/send-otp" } }, output={ "errors": [ { "errorCode": "invalid_auth_factor_type" } ], "sendOtpResp":{ "sendOtpResTemplate":"esignet/SendOtp/SendOtpResult" } }, inputTemplate=esignet/AuthenticateUser/AuthenticateUser, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=invalid_auth_factor_type, kycFields=null, description=Authenticate user without AuthFactorType UIN, uniqueIdentifier=TC_ESignet_AuthenticateUser_22, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_AuthenticateUserIDP_uin_Missing_Challenge_Neg |
| Testcase Dependency |
| [Dependent_Idrepo_AddIdentity_03, TC_ESignet_OAuthDetailsRequest_08, TC_ESignet_CreateOIDCClient_01] |
| Class Name |
| PostWithAutogenIdWithOtpGenerate |
| Testcase Input |
| testCaseName=ESignet_AuthenticateUserIDP_uin_Missing_Challenge_Neg, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_Invalid_Scen_smoke_Pos_UIN$", "authFactorType" : "OTP", "challenge" : "$REMOVE$", "sendOtp":{ "encodedHash": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_Invalid_Scen_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendOtp/SendOtp", "sendOtpEndPoint": "/v1/esignet/authorization/send-otp" } }, output={ "errors": [ { "errorCode": "invalid_challenge" } ], "sendOtpResp":{ "sendOtpResTemplate":"esignet/SendOtp/SendOtpResult" } }, inputTemplate=esignet/AuthenticateUser/AuthenticateUser, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=invalid_challenge, kycFields=null, description=Authenticate user without challenge UIN, uniqueIdentifier=TC_ESignet_AuthenticateUser_27, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_AuthenticateUserIDP_uin_Missing_IndividualId_Neg |
| Testcase Dependency |
| [Dependent_Idrepo_AddIdentity_03, TC_ESignet_OAuthDetailsRequest_08, TC_ESignet_CreateOIDCClient_01] |
| Class Name |
| PostWithAutogenIdWithOtpGenerate |
| Testcase Input |
| testCaseName=ESignet_AuthenticateUserIDP_uin_Missing_IndividualId_Neg, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_transactionId$", "individualId": "$REMOVE$", "authFactorType" : "OTP", "challenge" : "$ID:AddIdentity_Invalid_Scen_smoke_Pos_EMAIL$", "sendOtp":{ "encodedHash": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_Invalid_Scen_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendOtp/SendOtp", "sendOtpEndPoint": "/v1/esignet/authorization/send-otp" } }, output={ "errors": [ { "errorCode": "invalid_identifier" } ], "sendOtpResp":{ "sendOtpResTemplate":"esignet/SendOtp/SendOtpResult" } }, inputTemplate=esignet/AuthenticateUser/AuthenticateUser, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Authenticate user without individualId UIN, uniqueIdentifier=TC_ESignet_AuthenticateUser_18, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_AuthenticateUserIDP_uin_Missing_TransactionId_Neg |
| Testcase Dependency |
| [Dependent_Idrepo_AddIdentity_03, TC_ESignet_OAuthDetailsRequest_08, TC_ESignet_CreateOIDCClient_01] |
| Class Name |
| PostWithAutogenIdWithOtpGenerate |
| Testcase Input |
| testCaseName=ESignet_AuthenticateUserIDP_uin_Missing_TransactionId_Neg, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$REMOVE$", "individualId": "$ID:AddIdentity_Invalid_Scen_smoke_Pos_UIN$", "authFactorType" : "OTP", "challenge" : "$ID:AddIdentity_Invalid_Scen_smoke_Pos_EMAIL$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "encodedHash": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_encodedResp$", "transactionId": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_Invalid_Scen_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendOtp/SendOtp", "sendOtpEndPoint": "/v1/esignet/authorization/send-otp" } }, output={ "errors": [ { "errorCode": "invalid_transaction" } ], "sendOtpResp":{ "sendOtpResTemplate":"esignet/SendOtp/SendOtpResult" } }, inputTemplate=esignet/AuthenticateUser/AuthenticateUser, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Authenticate user without transactionId UIN, uniqueIdentifier=TC_ESignet_AuthenticateUser_14, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_AuthenticateUserIDP_uin_Null_AuthFactorType_Neg |
| Testcase Dependency |
| [Dependent_Idrepo_AddIdentity_03, TC_ESignet_OAuthDetailsRequest_08, TC_ESignet_CreateOIDCClient_01] |
| Class Name |
| PostWithAutogenIdWithOtpGenerate |
| Testcase Input |
| testCaseName=ESignet_AuthenticateUserIDP_uin_Null_AuthFactorType_Neg, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_Invalid_Scen_smoke_Pos_UIN$", "authFactorType" : "null", "challenge" : "$ID:AddIdentity_Invalid_Scen_smoke_Pos_EMAIL$", "sendOtp":{ "encodedHash": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_Invalid_Scen_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendOtp/SendOtp", "sendOtpEndPoint": "/v1/esignet/authorization/send-otp" } }, output={ "errors": [ { "errorCode": "invalid_auth_factor_type" } ], "sendOtpResp":{ "sendOtpResTemplate":"esignet/SendOtp/SendOtpResult" } }, inputTemplate=esignet/AuthenticateUser/AuthenticateUser, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Authenticate user with Null in AuthFactorType UIN, uniqueIdentifier=TC_ESignet_AuthenticateUser_24, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_AuthenticateUserIDP_uin_Null_Challenge_Neg |
| Testcase Dependency |
| [Dependent_Idrepo_AddIdentity_03, TC_ESignet_OAuthDetailsRequest_08, TC_ESignet_CreateOIDCClient_01] |
| Class Name |
| PostWithAutogenIdWithOtpGenerate |
| Testcase Input |
| testCaseName=ESignet_AuthenticateUserIDP_uin_Null_Challenge_Neg, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_Invalid_Scen_smoke_Pos_UIN$", "authFactorType" : "OTP", "challenge" : "null", "sendOtp":{ "encodedHash": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_Invalid_Scen_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendOtp/SendOtp", "sendOtpEndPoint": "/v1/esignet/authorization/send-otp" } }, output={ "errors": [ { "errorCode": "invalid_challenge" } ], "sendOtpResp":{ "sendOtpResTemplate":"esignet/SendOtp/SendOtpResult" } }, inputTemplate=esignet/AuthenticateUser/AuthenticateUser, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Authenticate user with Null in challenge UIN, uniqueIdentifier=TC_ESignet_AuthenticateUser_29, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_AuthenticateUserIDP_uin_Null_IndividualId_Neg |
| Testcase Dependency |
| [Dependent_Idrepo_AddIdentity_03, TC_ESignet_OAuthDetailsRequest_08, TC_ESignet_CreateOIDCClient_01] |
| Class Name |
| PostWithAutogenIdWithOtpGenerate |
| Testcase Input |
| testCaseName=ESignet_AuthenticateUserIDP_uin_Null_IndividualId_Neg, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_transactionId$", "individualId": "null", "authFactorType" : "OTP", "challenge" : "$ID:AddIdentity_Invalid_Scen_smoke_Pos_EMAIL$", "sendOtp":{ "encodedHash": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_Invalid_Scen_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendOtp/SendOtp", "sendOtpEndPoint": "/v1/esignet/authorization/send-otp" } }, output={ "errors": [ { "errorCode": "IDA-MLC-009" } ], "sendOtpResp":{ "sendOtpResTemplate":"esignet/SendOtp/SendOtpResult" } }, inputTemplate=esignet/AuthenticateUser/AuthenticateUser, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=IDA-MLC-009,invalid_individual_id, kycFields=null, description=Authenticate user with Null in individualId UIN, uniqueIdentifier=TC_ESignet_AuthenticateUser_20, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_AuthenticateUserIDP_uin_Null_TransactionId_Neg |
| Testcase Dependency |
| [Dependent_Idrepo_AddIdentity_03, TC_ESignet_OAuthDetailsRequest_08, TC_ESignet_CreateOIDCClient_01] |
| Class Name |
| PostWithAutogenIdWithOtpGenerate |
| Testcase Input |
| testCaseName=ESignet_AuthenticateUserIDP_uin_Null_TransactionId_Neg, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "null", "individualId": "$ID:AddIdentity_Invalid_Scen_smoke_Pos_UIN$", "authFactorType" : "OTP", "challenge" : "$ID:AddIdentity_Invalid_Scen_smoke_Pos_EMAIL$", "sendOtp":{ "encodedHash": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_Invalid_Scen_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendOtp/SendOtp", "sendOtpEndPoint": "/v1/esignet/authorization/send-otp" } }, output={ "errors": [ { "errorCode": "invalid_transaction" } ], "sendOtpResp":{ "sendOtpResTemplate":"esignet/SendOtp/SendOtpResult" } }, inputTemplate=esignet/AuthenticateUser/AuthenticateUser, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Authenticate user with Null in transactionId UIN, uniqueIdentifier=TC_ESignet_AuthenticateUser_16, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_AuthenticateUserIDP_uin_Other_Otp_Valid_Smoke |
| Testcase Dependency |
| [Dependent_Idrepo_AddIdentity_03, TC_ESignet_OAuthDetailsRequest_08, TC_ESignet_CreateOIDCClient_01] |
| Class Name |
| PostWithAutogenIdWithOtpGenerate |
| Testcase Input |
| testCaseName=ESignet_AuthenticateUserIDP_uin_Other_Otp_Valid_Smoke, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_Invalid_Scen_smoke_Pos_UIN$", "authFactorType" : "OTP", "challenge" : "$ID:AddIdentity_Invalid_Scen_smoke_Pos_EMAIL$", "sendOtp":{ "encodedHash": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_Invalid_Scen_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendOtp/SendOtp", "sendOtpEndPoint": "/v1/esignet/authorization/send-otp" } }, output={ "sendOtpResp":{ "sendOtpResTemplate":"esignet/SendOtp/SendOtpResult" } }, inputTemplate=esignet/AuthenticateUser/AuthenticateUser, outputTemplate=esignet/AuthenticateUser/AuthenticateUserResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Authenticate user with other Otp valid details UIN, uniqueIdentifier=TC_ESignet_AuthenticateUser_31, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_AuthenticateUserIDP_uin_Otp_Valid_Smoke |
| Testcase Dependency |
| [Dependent_Idrepo_AddIdentity_01, TC_ESignet_OAuthDetailsRequest_01, TC_ESignet_CreateOIDCClient_01] |
| Class Name |
| PostWithAutogenIdWithOtpGenerate |
| Testcase Input |
| testCaseName=ESignet_AuthenticateUserIDP_uin_Otp_Valid_Smoke, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_all_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_Valid_Parameters_smoke_Pos_UIN$", "authFactorType" : "OTP", "challenge" : "$ID:AddIdentity_Valid_Parameters_smoke_Pos_EMAIL$", "sendOtp":{ "encodedHash": "$ID:OAuthDetailsRequest_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_all_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_Valid_Parameters_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendOtp/SendOtp", "sendOtpEndPoint": "/v1/esignet/authorization/send-otp" } }, output={ "sendOtpResp":{ "sendOtpResTemplate":"esignet/SendOtp/SendOtpResult" } }, inputTemplate=esignet/AuthenticateUser/AuthenticateUser, outputTemplate=esignet/AuthenticateUser/AuthenticateUserResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Authenticate user with Otp UIN, uniqueIdentifier=TC_ESignet_AuthenticateUser_01, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_AuthenticateUserIDP_uin_Otp_for_NegauthCode |
| Testcase Dependency |
| [] |
| Class Name |
| PostWithAutogenIdWithOtpGenerate |
| Testcase Input |
| testCaseName=ESignet_AuthenticateUserIDP_uin_Otp_for_NegauthCode, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_all_Valid_for_authCode_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_all_Valid_for_authCode_sid_transactionId$", "individualId": "$ID:AddIdentity_Valid_Parameters_smoke_Pos_UIN$", "authFactorType" : "OTP", "challenge" : "$ID:AddIdentity_Valid_Parameters_smoke_Pos_EMAIL$", "sendOtp":{ "encodedHash": "$ID:OAuthDetailsRequest_all_Valid_for_authCode_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_all_Valid_for_authCode_sid_transactionId$", "individualId": "$ID:AddIdentity_Valid_Parameters_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendOtp/SendOtp", "sendOtpEndPoint": "/v1/esignet/authorization/send-otp" } }, output={ "sendOtpResp":{ "sendOtpResTemplate":"esignet/SendOtp/SendOtpResult" } }, inputTemplate=esignet/AuthenticateUser/AuthenticateUser, outputTemplate=esignet/AuthenticateUser/AuthenticateUserResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Authenticate user with Otp UIN, uniqueIdentifier=TC_ESignet_AuthenticateUser_55, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_AuthenticateUserIDP_uin_Otp_for_OnlyOptionalClaim |
| Testcase Dependency |
| [] |
| Class Name |
| PostWithAutogenIdWithOtpGenerate |
| Testcase Input |
| testCaseName=ESignet_AuthenticateUserIDP_uin_Otp_for_OnlyOptionalClaim, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_all_Valid_for_authCode_onlyOptionalClaim_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_all_Valid_for_authCode_onlyOptionalClaim_sid_transactionId$", "individualId": "$ID:AddIdentity_Valid_Parameters_smoke_Pos_UIN$", "authFactorType" : "OTP", "challenge" : "$ID:AddIdentity_Valid_Parameters_smoke_Pos_EMAIL$", "sendOtp":{ "encodedHash": "$ID:OAuthDetailsRequest_all_Valid_for_authCode_onlyOptionalClaim_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_all_Valid_for_authCode_onlyOptionalClaim_sid_transactionId$", "individualId": "$ID:AddIdentity_Valid_Parameters_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendOtp/SendOtp", "sendOtpEndPoint": "/v1/esignet/authorization/send-otp" } }, output={ "sendOtpResp":{ "sendOtpResTemplate":"esignet/SendOtp/SendOtpResult" } }, inputTemplate=esignet/AuthenticateUser/AuthenticateUser, outputTemplate=esignet/AuthenticateUser/AuthenticateUserResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Authenticate user with Otp UIN, uniqueIdentifier=TC_ESignet_AuthenticateUser_56, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_AuthenticateUserIDP_uin_Otp_for_OnlyOptionalClaim_user2 |
| Testcase Dependency |
| [] |
| Class Name |
| PostWithAutogenIdWithOtpGenerate |
| Testcase Input |
| testCaseName=ESignet_AuthenticateUserIDP_uin_Otp_for_OnlyOptionalClaim_user2, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_all_Valid_for_authCode_onlyOptionalClaim_user2_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_all_Valid_for_authCode_onlyOptionalClaim_user2_sid_transactionId$", "individualId": "$ID:AddIdentity_Valid_Parameters_smoke_Pos_UIN$", "authFactorType" : "OTP", "challenge" : "$ID:AddIdentity_Valid_Parameters_smoke_Pos_EMAIL$", "sendOtp":{ "encodedHash": "$ID:OAuthDetailsRequest_all_Valid_for_authCode_onlyOptionalClaim_user2_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_all_Valid_for_authCode_onlyOptionalClaim_user2_sid_transactionId$", "individualId": "$ID:AddIdentity_Valid_Parameters_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendOtp/SendOtp", "sendOtpEndPoint": "/v1/esignet/authorization/send-otp" } }, output={ "sendOtpResp":{ "sendOtpResTemplate":"esignet/SendOtp/SendOtpResult", } }, inputTemplate=esignet/AuthenticateUser/AuthenticateUser, outputTemplate=esignet/AuthenticateUser/AuthenticateUserResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Authenticate user with Otp UIN, uniqueIdentifier=TC_ESignet_AuthenticateUser_57, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_AuthorizationCode_Vid_All_Valid_Smoke_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_AuthorizationCode_Vid_All_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/auth-code, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_Vid_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_Vid_Valid_Smoke_sid_transactionId$", "acceptedClaims": [{claim: "name"},{claim: "gender"},{claim: "email"}] }, output={ }, inputTemplate=esignet/AuthorizationCode/AuthorizationCode, outputTemplate=esignet/AuthorizationCode/AuthorizationCodeResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Authorization code request with all valid details VID, uniqueIdentifier=TC_ESignet_AuthorizationCode_17, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:101)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_AuthorizationCode_Vid_Diff_requestTime_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_AuthorizationCode_Vid_Diff_requestTime_Neg, endPoint=/v1/esignet/authorization/auth-code, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_encodedResp$", "requestTime": "2022-11-07T06:51:30.195Z", "transactionId": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_transactionId$", "acceptedClaims": [{claim: "name"},{claim: "gender"},{claim: "email"}] }, output={ "errors": [ { "errorCode": "invalid_request" } ] }, inputTemplate=esignet/AuthorizationCode/AuthorizationCode, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Authorization code request with different requestTime VID, uniqueIdentifier=TC_ESignet_AuthorizationCode_31, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:101)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_AuthorizationCode_Vid_Empty_PermittedAuthorizeScopes_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_AuthorizationCode_Vid_Empty_PermittedAuthorizeScopes_Neg, endPoint=/v1/esignet/authorization/auth-code, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_2nd_vid_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_2nd_vid_Valid_Smoke_sid_transactionId$", "acceptedClaims": [{claim: "name"},{claim: "gender"},{claim: "email"}], "permittedAuthorizeScopes": [{scope: ""}] }, output={ "errors": [ { "errorCode": "invalid_permitted_scope" } ] }, inputTemplate=esignet/AuthorizationCode/AuthorizationCode, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Authorization code request with empty value in PermittedAuthorizeScopes VID, uniqueIdentifier=TC_ESignet_AuthorizationCode_23, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:101)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_AuthorizationCode_Vid_Empty_TransactionId_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_AuthorizationCode_Vid_Empty_TransactionId_Neg, endPoint=/v1/esignet/authorization/auth-code, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_Vid_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "", "acceptedClaims": [{claim: "name"},{claim: "gender"},{claim: "email"}] }, output={ "errors": [ { "errorCode": "invalid_transaction" } ] }, inputTemplate=esignet/AuthorizationCode/AuthorizationCode, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Authorization code request with empty value in transactionId VID, uniqueIdentifier=TC_ESignet_AuthorizationCode_20, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:101)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_AuthorizationCode_Vid_Empty_acceptedClaims_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_AuthorizationCode_Vid_Empty_acceptedClaims_Neg, endPoint=/v1/esignet/authorization/auth-code, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_Vid_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_Vid_Valid_Smoke_sid_transactionId$", "acceptedClaims": [{claim: ""}] }, output={ "errors": [ { "errorCode": "invalid_transaction" } ] }, inputTemplate=esignet/AuthorizationCode/AuthorizationCode, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Authorization code request with empty accepted claims VID, uniqueIdentifier=TC_ESignet_AuthorizationCode_28, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:101)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_AuthorizationCode_Vid_Expired_TransactionId_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_AuthorizationCode_Vid_Expired_TransactionId_Neg, endPoint=/v1/esignet/authorization/auth-code, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_Vid_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "EvOHK0ewF4AlCAVAw-aVZD1JXDNBVNtkIPGrsvxPTkw", "acceptedClaims": [{claim: "name"},{claim: "gender"},{claim: "email"}] }, output={ "errors": [ { "errorCode": "invalid_transaction" } ] }, inputTemplate=esignet/AuthorizationCode/AuthorizationCode, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Authorization code request with expired transactionId VID, uniqueIdentifier=TC_ESignet_AuthorizationCode_22, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:101)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_AuthorizationCode_Vid_Future_RequestTime_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_AuthorizationCode_Vid_Future_RequestTime_Neg, endPoint=/v1/esignet/authorization/auth-code, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_encodedResp$", "requestTime": "2033-11-07T06:51:30.195Z", "transactionId": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_transactionId$", "acceptedClaims": [{claim: "name"},{claim: "gender"},{claim: "email"}] }, output={ "errors": [ { "errorCode": "invalid_request" } ] }, inputTemplate=esignet/AuthorizationCode/AuthorizationCode, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Authorization code request with future requestTime VID, uniqueIdentifier=TC_ESignet_AuthorizationCode_32, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:101)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_AuthorizationCode_Vid_Invalid_PermittedAuthorizeScopes_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_AuthorizationCode_Vid_Invalid_PermittedAuthorizeScopes_Neg, endPoint=/v1/esignet/authorization/auth-code, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_2nd_vid_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_2nd_vid_Valid_Smoke_sid_transactionId$", "acceptedClaims": [{claim: "name"},{claim: "gender"},{claim: "email"}], "permittedAuthorizeScopes": [{scope: "abc"}] }, output={ "errors": [ { "errorCode": "invalid_permitted_scope" } ] }, inputTemplate=esignet/AuthorizationCode/AuthorizationCode, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Authorization code request with invalid PermittedAuthorizeScopes VID, uniqueIdentifier=TC_ESignet_AuthorizationCode_24, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:101)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_AuthorizationCode_Vid_Invalid_TransactionId_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_AuthorizationCode_Vid_Invalid_TransactionId_Neg, endPoint=/v1/esignet/authorization/auth-code, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_Vid_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "transactionId", "acceptedClaims": [{claim: "name"},{claim: "gender"},{claim: "email"}] }, output={ "errors": [ { "errorCode": "invalid_transaction" } ] }, inputTemplate=esignet/AuthorizationCode/AuthorizationCode, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Authorization code request with invalid transactionId VID, uniqueIdentifier=TC_ESignet_AuthorizationCode_18, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:101)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_AuthorizationCode_Vid_Invalid_acceptedClaims_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_AuthorizationCode_Vid_Invalid_acceptedClaims_Neg, endPoint=/v1/esignet/authorization/auth-code, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_Vid_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_Vid_Valid_Smoke_sid_transactionId$", "acceptedClaims": [{claim: "jsdgh#4$#"}] }, output={ "errors": [ { "errorCode": "invalid_transaction" } ] }, inputTemplate=esignet/AuthorizationCode/AuthorizationCode, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Authorization code request with invalid accepted claims VID, uniqueIdentifier=TC_ESignet_AuthorizationCode_26, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:101)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_AuthorizationCode_Vid_Invalid_requestTime_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_AuthorizationCode_Vid_Invalid_requestTime_Neg, endPoint=/v1/esignet/authorization/auth-code, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_encodedResp$", "requestTime": "2022-11-08T06:35:53", "transactionId": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_transactionId$", "acceptedClaims": [{claim: "name"},{claim: "gender"},{claim: "email"}] }, output={ "errors": [ { "errorCode": "invalid_request" } ] }, inputTemplate=esignet/AuthorizationCode/AuthorizationCode, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Authorization code request with invalid requestTime VID, uniqueIdentifier=TC_ESignet_AuthorizationCode_30, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:101)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_AuthorizationCode_Vid_Missing_Claims_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_AuthorizationCode_Vid_Missing_Claims_Neg, endPoint=/v1/esignet/authorization/auth-code, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_2_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_2_all_Valid_Smoke_sid_transactionId$", "acceptedClaims": [{claim: "$REMOVE$"}] }, output={ "errors": [ { "errorCode": "invalid_transaction" } ] }, inputTemplate=esignet/AuthorizationCode/AuthorizationCode, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Authorization code request without claims VID, uniqueIdentifier=TC_ESignet_AuthorizationCode_27, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:101)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_AuthorizationCode_Vid_Missing_TransactionId_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_AuthorizationCode_Vid_Missing_TransactionId_Neg, endPoint=/v1/esignet/authorization/auth-code, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_Vid_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$REMOVE$", "acceptedClaims": [{claim: "name"},{claim: "gender"},{claim: "email"}] }, output={ "errors": [ { "errorCode": "invalid_transaction" } ] }, inputTemplate=esignet/AuthorizationCode/AuthorizationCode, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Authorization code request without transactionId VID, uniqueIdentifier=TC_ESignet_AuthorizationCode_19, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:101)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_AuthorizationCode_Vid_Null_PermittedAuthorizeScopes_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_AuthorizationCode_Vid_Null_PermittedAuthorizeScopes_Neg, endPoint=/v1/esignet/authorization/auth-code, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_2nd_vid_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_2nd_vid_Valid_Smoke_sid_transactionId$", "acceptedClaims": [{claim: "name"},{claim: "gender"},{claim: "email"}], "permittedAuthorizeScopes": [{scope: "null"}] }, output={ "errors": [ { "errorCode": "invalid_permitted_scope" } ] }, inputTemplate=esignet/AuthorizationCode/AuthorizationCode, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Authorization code request with Null in PermittedAuthorizeScopes VID, uniqueIdentifier=TC_ESignet_AuthorizationCode_25, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:101)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_AuthorizationCode_Vid_Null_TransactionId_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_AuthorizationCode_Vid_Null_TransactionId_Neg, endPoint=/v1/esignet/authorization/auth-code, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_Vid_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "null", "acceptedClaims": [{claim: "name"},{claim: "gender"},{claim: "email"}] }, output={ "errors": [ { "errorCode": "invalid_transaction" } ] }, inputTemplate=esignet/AuthorizationCode/AuthorizationCode, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Authorization code request with Null in transactionId VID, uniqueIdentifier=TC_ESignet_AuthorizationCode_21, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:101)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_AuthorizationCode_Vid_Null_acceptedClaims_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_AuthorizationCode_Vid_Null_acceptedClaims_Neg, endPoint=/v1/esignet/authorization/auth-code, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_Vid_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_Vid_Valid_Smoke_sid_transactionId$", "acceptedClaims": [{claim: "null"}] }, output={ "errors": [ { "errorCode": "invalid_transaction" } ] }, inputTemplate=esignet/AuthorizationCode/AuthorizationCode, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Authorization code request with Null in accepted claims VID, uniqueIdentifier=TC_ESignet_AuthorizationCode_29, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:101)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_AuthorizationCode_uin_All_Valid_Smoke_sid |
| Testcase Dependency |
| [TC_ESignet_OAuthDetailsRequest_01, TC_ESignet_CreateOIDCClient_01] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_AuthorizationCode_uin_All_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/auth-code, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_all_Valid_Smoke_sid_transactionId$", "acceptedClaims": [{claim: "name"},{claim: "gender"},{claim: "email"}] }, output={ }, inputTemplate=esignet/AuthorizationCode/AuthorizationCode, outputTemplate=esignet/AuthorizationCode/AuthorizationCodeResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Authorization code request with all valid details UIN, uniqueIdentifier=TC_ESignet_AuthorizationCode_01, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_AuthorizationCode_uin_All_Valid_onlyEssentialClaim_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_AuthorizationCode_uin_All_Valid_onlyEssentialClaim_sid, endPoint=/v1/esignet/authorization/auth-code, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_all_Valid_for_authCode_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_all_Valid_for_authCode_sid_transactionId$", "acceptedClaims": [{claim: "name"},{claim: "email"}] }, output={ }, inputTemplate=esignet/AuthorizationCode/AuthorizationCode, outputTemplate=esignet/AuthorizationCode/AuthorizationCodeResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Authorization code request with only accepted claim, uniqueIdentifier=TC_ESignet_AuthorizationCode_35, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_AuthorizationCode_uin_All_Valid_onlyOptionalClaim_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_AuthorizationCode_uin_All_Valid_onlyOptionalClaim_sid, endPoint=/v1/esignet/authorization/auth-code, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_all_Valid_for_authCode_onlyOptionalClaim_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_all_Valid_for_authCode_onlyOptionalClaim_sid_transactionId$", "acceptedClaims": [{claim: "gender"},{claim: "name"}] }, output={ }, inputTemplate=esignet/AuthorizationCode/AuthorizationCode, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Authorization code by providing only optional claim provided only optional claims are part of requested claim, uniqueIdentifier=TC_ESignet_AuthorizationCode_36, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_AuthorizationCode_uin_All_Valid_onlyOptionalClaim_user2_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_AuthorizationCode_uin_All_Valid_onlyOptionalClaim_user2_sid, endPoint=/v1/esignet/authorization/auth-code, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_all_Valid_for_authCode_onlyOptionalClaim_user2_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_all_Valid_for_authCode_onlyOptionalClaim_user2_sid_transactionId$", "acceptedClaims": [] }, output={ }, inputTemplate=esignet/AuthorizationCode/AuthorizationCode, outputTemplate=esignet/AuthorizationCode/AuthorizationCodeResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Authorization code by not providing any accepted claims provided there is no requested essential claims, uniqueIdentifier=TC_ESignet_AuthorizationCode_37, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_AuthorizationCode_uin_Diff_requestTime_Neg |
| Testcase Dependency |
| [TC_ESignet_OAuthDetailsRequest_08, TC_ESignet_CreateOIDCClient_01] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_AuthorizationCode_uin_Diff_requestTime_Neg, endPoint=/v1/esignet/authorization/auth-code, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_encodedResp$", "requestTime": "2022-11-07T06:51:30.195Z", "transactionId": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_transactionId$", "acceptedClaims": [{claim: "name"},{claim: "gender"},{claim: "email"}] }, output={ "errors": [ { "errorCode": "invalid_request" } ] }, inputTemplate=esignet/AuthorizationCode/AuthorizationCode, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Authorization code request with different requestTime UIN, uniqueIdentifier=TC_ESignet_AuthorizationCode_15, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_AuthorizationCode_uin_Empty_PermittedAuthorizeScopes_Neg |
| Testcase Dependency |
| [TC_ESignet_OAuthDetailsRequest_02, TC_ESignet_CreateOIDCClient_01] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_AuthorizationCode_uin_Empty_PermittedAuthorizeScopes_Neg, endPoint=/v1/esignet/authorization/auth-code, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_2nd_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_2nd_Valid_Smoke_sid_transactionId$", "acceptedClaims": [{claim: "name"},{claim: "gender"},{claim: "email"}], "permittedAuthorizeScopes": [{scope: ""}] }, output={ "errors": [ { "errorCode": "invalid_permitted_scope" } ] }, inputTemplate=esignet/AuthorizationCode/AuthorizationCode, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Authorization code request with empty PermittedAuthorizeScopes UIN, uniqueIdentifier=TC_ESignet_AuthorizationCode_07, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_AuthorizationCode_uin_Empty_TransactionId_Neg |
| Testcase Dependency |
| [TC_ESignet_OAuthDetailsRequest_01, TC_ESignet_CreateOIDCClient_01] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_AuthorizationCode_uin_Empty_TransactionId_Neg, endPoint=/v1/esignet/authorization/auth-code, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "", "acceptedClaims": [{claim: "name"},{claim: "gender"},{claim: "email"}] }, output={ "errors": [ { "errorCode": "invalid_transaction" } ] }, inputTemplate=esignet/AuthorizationCode/AuthorizationCode, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Authorization code request with empty value in transactionId UIN, uniqueIdentifier=TC_ESignet_AuthorizationCode_04, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_AuthorizationCode_uin_Empty_acceptedClaims_Neg |
| Testcase Dependency |
| [TC_ESignet_OAuthDetailsRequest_01, TC_ESignet_CreateOIDCClient_01] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_AuthorizationCode_uin_Empty_acceptedClaims_Neg, endPoint=/v1/esignet/authorization/auth-code, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_all_Valid_Smoke_sid_transactionId$", "acceptedClaims": [{claim: ""}] }, output={ "errors": [ { "errorCode": "invalid_transaction" } ] }, inputTemplate=esignet/AuthorizationCode/AuthorizationCode, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Authorization code request with empty accepted claims UIN, uniqueIdentifier=TC_ESignet_AuthorizationCode_12, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_AuthorizationCode_uin_Expired_TransactionId_Neg |
| Testcase Dependency |
| [TC_ESignet_OAuthDetailsRequest_01, TC_ESignet_CreateOIDCClient_01] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_AuthorizationCode_uin_Expired_TransactionId_Neg, endPoint=/v1/esignet/authorization/auth-code, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "EvOHK0ewF4AlCAVAw-aVZD1JXDNBVNtkIPGrsvxPTkw", "acceptedClaims": [{claim: "name"},{claim: "gender"},{claim: "email"}] }, output={ "errors": [ { "errorCode": "invalid_transaction" } ] }, inputTemplate=esignet/AuthorizationCode/AuthorizationCode, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Authorization code request with expired transactionId UIN, uniqueIdentifier=TC_ESignet_AuthorizationCode_06, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_AuthorizationCode_uin_Future_RequestTime_Neg |
| Testcase Dependency |
| [TC_ESignet_OAuthDetailsRequest_08, TC_ESignet_CreateOIDCClient_01] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_AuthorizationCode_uin_Future_RequestTime_Neg, endPoint=/v1/esignet/authorization/auth-code, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_encodedResp$", "requestTime": "2033-11-07T06:51:30.195Z", "transactionId": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_transactionId$", "acceptedClaims": [{claim: "name"},{claim: "gender"},{claim: "email"}] }, output={ "errors": [ { "errorCode": "invalid_request" } ] }, inputTemplate=esignet/AuthorizationCode/AuthorizationCode, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Authorization code request with future requestTime UIN, uniqueIdentifier=TC_ESignet_AuthorizationCode_16, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_AuthorizationCode_uin_Invalid_PermittedAuthorizeScopes_Neg |
| Testcase Dependency |
| [TC_ESignet_OAuthDetailsRequest_02, TC_ESignet_CreateOIDCClient_01] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_AuthorizationCode_uin_Invalid_PermittedAuthorizeScopes_Neg, endPoint=/v1/esignet/authorization/auth-code, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_2nd_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_2nd_Valid_Smoke_sid_transactionId$", "acceptedClaims": [{claim: "name"},{claim: "gender"},{claim: "email"}], "permittedAuthorizeScopes": [{scope: "abc"}] }, output={ "errors": [ { "errorCode": "invalid_permitted_scope" } ] }, inputTemplate=esignet/AuthorizationCode/AuthorizationCode, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Authorization code request with invalid PermittedAuthorizeScopes UIN, uniqueIdentifier=TC_ESignet_AuthorizationCode_08, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_AuthorizationCode_uin_Invalid_TransactionId_Neg |
| Testcase Dependency |
| [TC_ESignet_OAuthDetailsRequest_01, TC_ESignet_CreateOIDCClient_01] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_AuthorizationCode_uin_Invalid_TransactionId_Neg, endPoint=/v1/esignet/authorization/auth-code, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "transactionId", "acceptedClaims": [{claim: "name"},{claim: "gender"},{claim: "email"}] }, output={ "errors": [ { "errorCode": "invalid_transaction" } ] }, inputTemplate=esignet/AuthorizationCode/AuthorizationCode, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Authorization code request with invalid transactionId UIN, uniqueIdentifier=TC_ESignet_AuthorizationCode_02, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_AuthorizationCode_uin_Invalid_acceptedClaims_Neg |
| Testcase Dependency |
| [TC_ESignet_OAuthDetailsRequest_01, TC_ESignet_CreateOIDCClient_01] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_AuthorizationCode_uin_Invalid_acceptedClaims_Neg, endPoint=/v1/esignet/authorization/auth-code, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_all_Valid_Smoke_sid_transactionId$", "acceptedClaims": [{claim: "jsdgh#4$#"}] }, output={ "errors": [ { "errorCode": "invalid_transaction" } ] }, inputTemplate=esignet/AuthorizationCode/AuthorizationCode, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Authorization code request with invalid accepted claims UIN, uniqueIdentifier=TC_ESignet_AuthorizationCode_10, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_AuthorizationCode_uin_Invalid_requestTime_Neg |
| Testcase Dependency |
| [TC_ESignet_OAuthDetailsRequest_08, TC_ESignet_CreateOIDCClient_01] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_AuthorizationCode_uin_Invalid_requestTime_Neg, endPoint=/v1/esignet/authorization/auth-code, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_encodedResp$", "requestTime": "2022-11-08T06:35:53", "transactionId": "$ID:OAuthDetailsRequest_Other_Valid_Smoke_sid_transactionId$", "acceptedClaims": [{claim: "name"},{claim: "gender"},{claim: "email"}] }, output={ "errors": [ { "errorCode": "invalid_request" } ] }, inputTemplate=esignet/AuthorizationCode/AuthorizationCode, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Authorization code request with invalid requestTime UIN, uniqueIdentifier=TC_ESignet_AuthorizationCode_14, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_AuthorizationCode_uin_Missing_Claims_Pos |
| Testcase Dependency |
| [TC_ESignet_OAuthDetailsRequest_34, TC_ESignet_CreateOIDCClient_01] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_AuthorizationCode_uin_Missing_Claims_Pos, endPoint=/v1/esignet/authorization/auth-code, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_2_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_2_all_Valid_Smoke_sid_transactionId$", "acceptedClaims": [{claim: "$REMOVE$"}] }, output={ "errors": [ { "errorCode": "invalid_transaction" } ] }, inputTemplate=esignet/AuthorizationCode/AuthorizationCode, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Authorization code request without claims UIN, uniqueIdentifier=TC_ESignet_AuthorizationCode_11, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_AuthorizationCode_uin_Missing_TransactionId_Neg |
| Testcase Dependency |
| [TC_ESignet_OAuthDetailsRequest_01, TC_ESignet_CreateOIDCClient_01] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_AuthorizationCode_uin_Missing_TransactionId_Neg, endPoint=/v1/esignet/authorization/auth-code, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$REMOVE$", "acceptedClaims": [{claim: "name"},{claim: "gender"},{claim: "email"}] }, output={ "errors": [ { "errorCode": "invalid_transaction" } ] }, inputTemplate=esignet/AuthorizationCode/AuthorizationCode, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Authorization code request without transactionId UIN, uniqueIdentifier=TC_ESignet_AuthorizationCode_03, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_AuthorizationCode_uin_Null_PermittedAuthorizeScopes_Neg |
| Testcase Dependency |
| [TC_ESignet_OAuthDetailsRequest_02, TC_ESignet_CreateOIDCClient_01] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_AuthorizationCode_uin_Null_PermittedAuthorizeScopes_Neg, endPoint=/v1/esignet/authorization/auth-code, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_2nd_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_2nd_Valid_Smoke_sid_transactionId$", "acceptedClaims": [{claim: "name"},{claim: "gender"},{claim: "email"}], "permittedAuthorizeScopes": [{scope: "null"}] }, output={ "errors": [ { "errorCode": "invalid_permitted_scope" } ] }, inputTemplate=esignet/AuthorizationCode/AuthorizationCode, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Authorization code request with Null in PermittedAuthorizeScopes UIN, uniqueIdentifier=TC_ESignet_AuthorizationCode_09, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_AuthorizationCode_uin_Null_TransactionId_Neg |
| Testcase Dependency |
| [TC_ESignet_OAuthDetailsRequest_01, TC_ESignet_CreateOIDCClient_01] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_AuthorizationCode_uin_Null_TransactionId_Neg, endPoint=/v1/esignet/authorization/auth-code, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "null", "acceptedClaims": [{claim: "name"},{claim: "gender"},{claim: "email"}] }, output={ "errors": [ { "errorCode": "invalid_transaction" } ] }, inputTemplate=esignet/AuthorizationCode/AuthorizationCode, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Authorization code request with Null in transactionId UIN, uniqueIdentifier=TC_ESignet_AuthorizationCode_05, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_AuthorizationCode_uin_Null_acceptedClaims_Neg |
| Testcase Dependency |
| [TC_ESignet_OAuthDetailsRequest_01, TC_ESignet_CreateOIDCClient_01] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_AuthorizationCode_uin_Null_acceptedClaims_Neg, endPoint=/v1/esignet/authorization/auth-code, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_all_Valid_Smoke_sid_transactionId$", "acceptedClaims": [{claim: "null"}] }, output={ "errors": [ { "errorCode": "invalid_transaction" } ] }, inputTemplate=esignet/AuthorizationCode/AuthorizationCode, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Authorization code request with Null in accepted claims UIN, uniqueIdentifier=TC_ESignet_AuthorizationCode_13, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_AuthorizationCode_uin_acceptedClaims_with_OneessentialClaimAllOptionalClaim_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_AuthorizationCode_uin_acceptedClaims_with_OneessentialClaimAllOptionalClaim_Neg, endPoint=/v1/esignet/authorization/auth-code, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_all_Valid_for_authCode_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_all_Valid_for_authCode_sid_transactionId$", "acceptedClaims": [{claim: "name"},{claim: "gender"},{claim: "picture"}] }, output={ "errors": [ { "errorCode": "invalid_accepted_claim" } ] }, inputTemplate=esignet/AuthorizationCode/AuthorizationCode, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Authorization code request with essential claim and optional Claims, uniqueIdentifier=TC_ESignet_AuthorizationCode_34, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_AuthorizationCode_uin_acceptedClaims_without_essentialClaim_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_AuthorizationCode_uin_acceptedClaims_without_essentialClaim_Neg, endPoint=/v1/esignet/authorization/auth-code, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_all_Valid_for_authCode_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_all_Valid_for_authCode_sid_transactionId$", "acceptedClaims": [{claim: "gender"},{claim: "picture"}] }, output={ "errors": [ { "errorCode": "invalid_accepted_claim" } ] }, inputTemplate=esignet/AuthorizationCode/AuthorizationCode, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Authorization code request without essential claim, uniqueIdentifier=TC_ESignet_AuthorizationCode_33, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_GenerateToken_Vid_Empty_ClientAssertionType_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenIdForUrlEncoded |
| Testcase Input |
| testCaseName=ESignet_GenerateToken_Vid_Empty_ClientAssertionType_Neg, endPoint=$GETENDPOINTFROMWELLKNOWN$, role=resident, templateFields=null, input={ "grant_type": "authorization_code", "code": "$ID:AuthorizationCode_Vid_All_Valid_Smoke_sid_code$", "client_id": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "client_assertion_type": "", "client_assertion": "$CLIENT_ASSERTION_JWK$", "redirect_uri": "$IDPREDIRECTURI$" }, output={ "error": "invalid_client" }, inputTemplate=esignet/GenerateToken/GenerateToken, outputTemplate=esignet/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generate token with empty value in ClientAssertionType VID, uniqueIdentifier=TC_ESignet_GenerateToken_54, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenIdForUrlEncoded.test(SimplePostForAutoGenIdForUrlEncoded.java:102)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_GenerateToken_Vid_Empty_ClientAssertion_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenIdForUrlEncoded |
| Testcase Input |
| testCaseName=ESignet_GenerateToken_Vid_Empty_ClientAssertion_Neg, endPoint=$GETENDPOINTFROMWELLKNOWN$, role=resident, templateFields=null, input={ "grant_type": "authorization_code", "code": "$ID:AuthorizationCode_Vid_All_Valid_Smoke_sid_code$", "client_id": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "client_assertion_type": "urn:ietf:params:oauth:client-assertion-type:jwt-bearer", "client_assertion": "", "redirect_uri": "$IDPREDIRECTURI$" }, output={ "error": "invalid_client" }, inputTemplate=esignet/GenerateToken/GenerateToken, outputTemplate=esignet/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generate token with empty value in ClientAssertion VID, uniqueIdentifier=TC_ESignet_GenerateToken_61, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenIdForUrlEncoded.test(SimplePostForAutoGenIdForUrlEncoded.java:102)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_GenerateToken_Vid_Empty_ClientId_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenIdForUrlEncoded |
| Testcase Input |
| testCaseName=ESignet_GenerateToken_Vid_Empty_ClientId_Neg, endPoint=$GETENDPOINTFROMWELLKNOWN$, role=resident, templateFields=null, input={ "grant_type": "authorization_code", "code": "$ID:AuthorizationCode_Vid_All_Valid_Smoke_sid_code$", "client_id": "", "client_assertion_type": "urn:ietf:params:oauth:client-assertion-type:jwt-bearer", "client_assertion": "$CLIENT_ASSERTION_JWK$", "redirect_uri": "$IDPREDIRECTURI$" }, output={ "error": "invalid_grant" }, inputTemplate=esignet/GenerateToken/GenerateToken, outputTemplate=esignet/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generate token with empty value in ClientId VID, uniqueIdentifier=TC_ESignet_GenerateToken_36, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenIdForUrlEncoded.test(SimplePostForAutoGenIdForUrlEncoded.java:102)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_GenerateToken_Vid_Empty_Code_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenIdForUrlEncoded |
| Testcase Input |
| testCaseName=ESignet_GenerateToken_Vid_Empty_Code_Neg, endPoint=$GETENDPOINTFROMWELLKNOWN$, role=resident, templateFields=null, input={ "grant_type": "authorization_code", "code": "", "client_id": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "client_assertion_type": "urn:ietf:params:oauth:client-assertion-type:jwt-bearer", "client_assertion": "$CLIENT_ASSERTION_JWK$", "redirect_uri": "$IDPREDIRECTURI$" }, output={ "error": "invalid_grant" }, inputTemplate=esignet/GenerateToken/GenerateToken, outputTemplate=esignet/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generate token with empty value in code VID, uniqueIdentifier=TC_ESignet_GenerateToken_45, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenIdForUrlEncoded.test(SimplePostForAutoGenIdForUrlEncoded.java:102)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_GenerateToken_Vid_Empty_Grant_type_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenIdForUrlEncoded |
| Testcase Input |
| testCaseName=ESignet_GenerateToken_Vid_Empty_Grant_type_Neg, endPoint=$GETENDPOINTFROMWELLKNOWN$, role=resident, templateFields=null, input={ "grant_type": "", "code": "$ID:AuthorizationCode_Vid_All_Valid_Smoke_sid_code$", "client_id": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "client_assertion_type": "urn:ietf:params:oauth:client-assertion-type:jwt-bearer", "client_assertion": "$CLIENT_ASSERTION_JWK$", "redirect_uri": "$IDPREDIRECTURI$" }, output={ "error": "unsupported_grant_type" }, inputTemplate=esignet/GenerateToken/GenerateToken, outputTemplate=esignet/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generate token with empty value in grant_type VID, uniqueIdentifier=TC_ESignet_GenerateToken_39, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenIdForUrlEncoded.test(SimplePostForAutoGenIdForUrlEncoded.java:102)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_GenerateToken_Vid_Empty_Redirect_uri_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenIdForUrlEncoded |
| Testcase Input |
| testCaseName=ESignet_GenerateToken_Vid_Empty_Redirect_uri_Neg, endPoint=$GETENDPOINTFROMWELLKNOWN$, role=resident, templateFields=null, input={ "grant_type": "authorization_code", "code": "$ID:AuthorizationCode_Vid_All_Valid_Smoke_sid_code$", "client_id": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "client_assertion_type": "urn:ietf:params:oauth:client-assertion-type:jwt-bearer", "client_assertion": "$CLIENT_ASSERTION_JWK$", "redirect_uri": "" }, output={ "error": "invalid_request" }, inputTemplate=esignet/GenerateToken/GenerateToken, outputTemplate=esignet/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generate token with empty value in redirect uri VID, uniqueIdentifier=TC_ESignet_GenerateToken_50, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenIdForUrlEncoded.test(SimplePostForAutoGenIdForUrlEncoded.java:102)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_GenerateToken_Vid_Incorrect_ClientAssertionType_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenIdForUrlEncoded |
| Testcase Input |
| testCaseName=ESignet_GenerateToken_Vid_Incorrect_ClientAssertionType_Neg, endPoint=$GETENDPOINTFROMWELLKNOWN$, role=resident, templateFields=null, input={ "grant_type": "authorization_code", "code": "$ID:AuthorizationCode_Vid_All_Valid_Smoke_sid_code$", "client_id": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "client_assertion_type": "urn ietf params oauth client-assertion-type jwt-bearer", "client_assertion": "$CLIENT_ASSERTION_JWK$", "redirect_uri": "$IDPREDIRECTURI$" }, output={ "error": "invalid_client" }, inputTemplate=esignet/GenerateToken/GenerateToken, outputTemplate=esignet/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generate token with incorrect ClientAssertionType VID, uniqueIdentifier=TC_ESignet_GenerateToken_52, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenIdForUrlEncoded.test(SimplePostForAutoGenIdForUrlEncoded.java:102)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_GenerateToken_Vid_Invalid_ClientAssertionType_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenIdForUrlEncoded |
| Testcase Input |
| testCaseName=ESignet_GenerateToken_Vid_Invalid_ClientAssertionType_Neg, endPoint=$GETENDPOINTFROMWELLKNOWN$, role=resident, templateFields=null, input={ "grant_type": "authorization_code", "code": "$ID:AuthorizationCode_Vid_All_Valid_Smoke_sid_code$", "client_id": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "client_assertion_type": "sdhb$$#@", "client_assertion": "$CLIENT_ASSERTION_JWK$", "redirect_uri": "$IDPREDIRECTURI$" }, output={ "error": "invalid_client" }, inputTemplate=esignet/GenerateToken/GenerateToken, outputTemplate=esignet/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generate token with invalid ClientAssertionType VID, uniqueIdentifier=TC_ESignet_GenerateToken_58, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenIdForUrlEncoded.test(SimplePostForAutoGenIdForUrlEncoded.java:102)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_GenerateToken_Vid_Invalid_ClientAssertion_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenIdForUrlEncoded |
| Testcase Input |
| testCaseName=ESignet_GenerateToken_Vid_Invalid_ClientAssertion_Neg, endPoint=$GETENDPOINTFROMWELLKNOWN$, role=resident, templateFields=null, input={ "grant_type": "authorization_code", "code": "$ID:AuthorizationCode_Vid_All_Valid_Smoke_sid_code$", "client_id": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "client_assertion_type": "urn:ietf:params:oauth:client-assertion-type:jwt-bearer", "client_assertion": "CLIENT_ASSERTION_JWK", "redirect_uri": "$IDPREDIRECTURI$" }, output={ "error": "invalid_grant" }, inputTemplate=esignet/GenerateToken/GenerateToken, outputTemplate=esignet/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generate token with invalid ClientAssertion VID, uniqueIdentifier=TC_ESignet_GenerateToken_59, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenIdForUrlEncoded.test(SimplePostForAutoGenIdForUrlEncoded.java:102)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_GenerateToken_Vid_Invalid_ClientId_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenIdForUrlEncoded |
| Testcase Input |
| testCaseName=ESignet_GenerateToken_Vid_Invalid_ClientId_Neg, endPoint=$GETENDPOINTFROMWELLKNOWN$, role=resident, templateFields=null, input={ "grant_type": "authorization_code", "code": "$ID:AuthorizationCode_Vid_All_Valid_Smoke_sid_code$", "client_id": "Client_clientId", "client_assertion_type": "urn:ietf:params:oauth:client-assertion-type:jwt-bearer", "client_assertion": "$CLIENT_ASSERTION_JWK$", "redirect_uri": "$IDPREDIRECTURI$" }, output={ "error": "invalid_grant" }, inputTemplate=esignet/GenerateToken/GenerateToken, outputTemplate=esignet/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generate token with invalid ClientId VID, uniqueIdentifier=TC_ESignet_GenerateToken_33, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenIdForUrlEncoded.test(SimplePostForAutoGenIdForUrlEncoded.java:102)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_GenerateToken_Vid_Invalid_Code_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenIdForUrlEncoded |
| Testcase Input |
| testCaseName=ESignet_GenerateToken_Vid_Invalid_Code_Neg, endPoint=$GETENDPOINTFROMWELLKNOWN$, role=resident, templateFields=null, input={ "grant_type": "authorization_code", "code": "AuthorizationCode_Vid_All_Valid_Smoke_sid_code", "client_id": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "client_assertion_type": "urn:ietf:params:oauth:client-assertion-type:jwt-bearer", "client_assertion": "$CLIENT_ASSERTION_JWK$", "redirect_uri": "$IDPREDIRECTURI$" }, output={ "error": "invalid_grant" }, inputTemplate=esignet/GenerateToken/GenerateToken, outputTemplate=esignet/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generate token with invalid code VID, uniqueIdentifier=TC_ESignet_GenerateToken_43, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenIdForUrlEncoded.test(SimplePostForAutoGenIdForUrlEncoded.java:102)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_GenerateToken_Vid_Invalid_Grant_type_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenIdForUrlEncoded |
| Testcase Input |
| testCaseName=ESignet_GenerateToken_Vid_Invalid_Grant_type_Neg, endPoint=$GETENDPOINTFROMWELLKNOWN$, role=resident, templateFields=null, input={ "grant_type": "hbkd$#$@@", "code": "$ID:AuthorizationCode_Vid_All_Valid_Smoke_sid_code$", "client_id": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "client_assertion_type": "urn:ietf:params:oauth:client-assertion-type:jwt-bearer", "client_assertion": "$CLIENT_ASSERTION_JWK$", "redirect_uri": "$IDPREDIRECTURI$" }, output={ "error": "unsupported_grant_type" }, inputTemplate=esignet/GenerateToken/GenerateToken, outputTemplate=esignet/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generate token with invalid grant_type VID, uniqueIdentifier=TC_ESignet_GenerateToken_37, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenIdForUrlEncoded.test(SimplePostForAutoGenIdForUrlEncoded.java:102)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_GenerateToken_Vid_Invalid_Redirect_uri_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenIdForUrlEncoded |
| Testcase Input |
| testCaseName=ESignet_GenerateToken_Vid_Invalid_Redirect_uri_Neg, endPoint=$GETENDPOINTFROMWELLKNOWN$, role=resident, templateFields=null, input={ "grant_type": "authorization_code", "code": "$ID:AuthorizationCode_Vid_All_Valid_Smoke_sid_code$", "client_id": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "client_assertion_type": "urn:ietf:params:oauth:client-assertion-type:jwt-bearer", "client_assertion": "$CLIENT_ASSERTION_JWK$", "redirect_uri": "https://new-services.com/newprofile" }, output={ "error": "invalid_grant" }, inputTemplate=esignet/GenerateToken/GenerateToken, outputTemplate=esignet/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generate token with invalid redirect uri VID, uniqueIdentifier=TC_ESignet_GenerateToken_48, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenIdForUrlEncoded.test(SimplePostForAutoGenIdForUrlEncoded.java:102)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_GenerateToken_Vid_Missing_ClientAssertionType_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenIdForUrlEncoded |
| Testcase Input |
| testCaseName=ESignet_GenerateToken_Vid_Missing_ClientAssertionType_Neg, endPoint=$GETENDPOINTFROMWELLKNOWN$, role=resident, templateFields=null, input={ "grant_type": "authorization_code", "code": "$ID:AuthorizationCode_Vid_All_Valid_Smoke_sid_code$", "client_id": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "client_assertion_type": "$REMOVE$", "client_assertion": "$CLIENT_ASSERTION_JWK$", "redirect_uri": "$IDPREDIRECTURI$" }, output={ "error": "invalid_client" }, inputTemplate=esignet/GenerateToken/GenerateToken, outputTemplate=esignet/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generate token without ClientAssertionType VID, uniqueIdentifier=TC_ESignet_GenerateToken_53, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenIdForUrlEncoded.test(SimplePostForAutoGenIdForUrlEncoded.java:102)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_GenerateToken_Vid_Missing_ClientAssertion_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenIdForUrlEncoded |
| Testcase Input |
| testCaseName=ESignet_GenerateToken_Vid_Missing_ClientAssertion_Neg, endPoint=$GETENDPOINTFROMWELLKNOWN$, role=resident, templateFields=null, input={ "grant_type": "authorization_code", "code": "$ID:AuthorizationCode_Vid_All_Valid_Smoke_sid_code$", "client_id": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "client_assertion_type": "urn:ietf:params:oauth:client-assertion-type:jwt-bearer", "client_assertion": "$REMOVE$", "redirect_uri": "$IDPREDIRECTURI$" }, output={ "error": "invalid_client" }, inputTemplate=esignet/GenerateToken/GenerateToken, outputTemplate=esignet/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generate token without ClientAssertion VID, uniqueIdentifier=TC_ESignet_GenerateToken_60, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenIdForUrlEncoded.test(SimplePostForAutoGenIdForUrlEncoded.java:102)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_GenerateToken_Vid_Missing_ClientId_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenIdForUrlEncoded |
| Testcase Input |
| testCaseName=ESignet_GenerateToken_Vid_Missing_ClientId_Neg, endPoint=$GETENDPOINTFROMWELLKNOWN$, role=resident, templateFields=null, input={ "grant_type": "authorization_code", "code": "$ID:AuthorizationCode_Vid_All_Valid_Smoke_sid_code$", "client_id": "$REMOVE$", "client_assertion_type": "urn:ietf:params:oauth:client-assertion-type:jwt-bearer", "client_assertion": "$CLIENT_ASSERTION_JWK$", "redirect_uri": "$IDPREDIRECTURI$" }, output={ "error": "invalid_grant" }, inputTemplate=esignet/GenerateToken/GenerateToken, outputTemplate=esignet/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generate token without ClientId VID, uniqueIdentifier=TC_ESignet_GenerateToken_34, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenIdForUrlEncoded.test(SimplePostForAutoGenIdForUrlEncoded.java:102)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_GenerateToken_Vid_Missing_Code_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenIdForUrlEncoded |
| Testcase Input |
| testCaseName=ESignet_GenerateToken_Vid_Missing_Code_Neg, endPoint=$GETENDPOINTFROMWELLKNOWN$, role=resident, templateFields=null, input={ "grant_type": "authorization_code", "code": "$REMOVE$", "client_id": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "client_assertion_type": "urn:ietf:params:oauth:client-assertion-type:jwt-bearer", "client_assertion": "$CLIENT_ASSERTION_JWK$", "redirect_uri": "$IDPREDIRECTURI$" }, output={ "error": "invalid_grant" }, inputTemplate=esignet/GenerateToken/GenerateToken, outputTemplate=esignet/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generate token without code VID, uniqueIdentifier=TC_ESignet_GenerateToken_44, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenIdForUrlEncoded.test(SimplePostForAutoGenIdForUrlEncoded.java:102)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_GenerateToken_Vid_Missing_Grant_type_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenIdForUrlEncoded |
| Testcase Input |
| testCaseName=ESignet_GenerateToken_Vid_Missing_Grant_type_Neg, endPoint=$GETENDPOINTFROMWELLKNOWN$, role=resident, templateFields=null, input={ "grant_type": "$REMOVE$", "code": "$ID:AuthorizationCode_Vid_All_Valid_Smoke_sid_code$", "client_id": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "client_assertion_type": "urn:ietf:params:oauth:client-assertion-type:jwt-bearer", "client_assertion": "$CLIENT_ASSERTION_JWK$", "redirect_uri": "$IDPREDIRECTURI$" }, output={ "error": "unsupported_grant_type" }, inputTemplate=esignet/GenerateToken/GenerateToken, outputTemplate=esignet/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generate token without grant_type VID, uniqueIdentifier=TC_ESignet_GenerateToken_38, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenIdForUrlEncoded.test(SimplePostForAutoGenIdForUrlEncoded.java:102)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_GenerateToken_Vid_Missing_Redirect_uri_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenIdForUrlEncoded |
| Testcase Input |
| testCaseName=ESignet_GenerateToken_Vid_Missing_Redirect_uri_Neg, endPoint=$GETENDPOINTFROMWELLKNOWN$, role=resident, templateFields=null, input={ "grant_type": "authorization_code", "code": "$ID:AuthorizationCode_Vid_All_Valid_Smoke_sid_code$", "client_id": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "client_assertion_type": "urn:ietf:params:oauth:client-assertion-type:jwt-bearer", "client_assertion": "$CLIENT_ASSERTION_JWK$", "redirect_uri": "$REMOVE$" }, output={ "error": "invalid_request" }, inputTemplate=esignet/GenerateToken/GenerateToken, outputTemplate=esignet/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generate token without redirect uri VID, uniqueIdentifier=TC_ESignet_GenerateToken_49, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenIdForUrlEncoded.test(SimplePostForAutoGenIdForUrlEncoded.java:102)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_GenerateToken_Vid_Null_ClientAssertionType_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenIdForUrlEncoded |
| Testcase Input |
| testCaseName=ESignet_GenerateToken_Vid_Null_ClientAssertionType_Neg, endPoint=$GETENDPOINTFROMWELLKNOWN$, role=resident, templateFields=null, input={ "grant_type": "authorization_code", "code": "$ID:AuthorizationCode_Vid_All_Valid_Smoke_sid_code$", "client_id": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "client_assertion_type": "null", "client_assertion": "$CLIENT_ASSERTION_JWK$", "redirect_uri": "$IDPREDIRECTURI$" }, output={ "error": "invalid_client" }, inputTemplate=esignet/GenerateToken/GenerateToken, outputTemplate=esignet/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generate token with Null in ClientAssertionType VID, uniqueIdentifier=TC_ESignet_GenerateToken_55, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenIdForUrlEncoded.test(SimplePostForAutoGenIdForUrlEncoded.java:102)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_GenerateToken_Vid_Null_ClientAssertion_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenIdForUrlEncoded |
| Testcase Input |
| testCaseName=ESignet_GenerateToken_Vid_Null_ClientAssertion_Neg, endPoint=$GETENDPOINTFROMWELLKNOWN$, role=resident, templateFields=null, input={ "grant_type": "authorization_code", "code": "$ID:AuthorizationCode_Vid_All_Valid_Smoke_sid_code$", "client_id": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "client_assertion_type": "urn:ietf:params:oauth:client-assertion-type:jwt-bearer", "client_assertion": "null", "redirect_uri": "$IDPREDIRECTURI$" }, output={ "error": "invalid_grant" }, inputTemplate=esignet/GenerateToken/GenerateToken, outputTemplate=esignet/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generate token with Null in ClientAssertion VID, uniqueIdentifier=TC_ESignet_GenerateToken_62, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenIdForUrlEncoded.test(SimplePostForAutoGenIdForUrlEncoded.java:102)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_GenerateToken_Vid_Null_ClientId_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenIdForUrlEncoded |
| Testcase Input |
| testCaseName=ESignet_GenerateToken_Vid_Null_ClientId_Neg, endPoint=$GETENDPOINTFROMWELLKNOWN$, role=resident, templateFields=null, input={ "grant_type": "authorization_code", "code": "$ID:AuthorizationCode_Vid_All_Valid_Smoke_sid_code$", "client_id": "null", "client_assertion_type": "urn:ietf:params:oauth:client-assertion-type:jwt-bearer", "client_assertion": "$CLIENT_ASSERTION_JWK$", "redirect_uri": "$IDPREDIRECTURI$" }, output={ "error": "invalid_grant" }, inputTemplate=esignet/GenerateToken/GenerateToken, outputTemplate=esignet/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generate token with Null in ClientId VID, uniqueIdentifier=TC_ESignet_GenerateToken_35, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenIdForUrlEncoded.test(SimplePostForAutoGenIdForUrlEncoded.java:102)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_GenerateToken_Vid_Null_Code_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenIdForUrlEncoded |
| Testcase Input |
| testCaseName=ESignet_GenerateToken_Vid_Null_Code_Neg, endPoint=$GETENDPOINTFROMWELLKNOWN$, role=resident, templateFields=null, input={ "grant_type": "authorization_code", "code": "null", "client_id": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "client_assertion_type": "urn:ietf:params:oauth:client-assertion-type:jwt-bearer", "client_assertion": "$CLIENT_ASSERTION_JWK$", "redirect_uri": "$IDPREDIRECTURI$" }, output={ "error": "invalid_grant" }, inputTemplate=esignet/GenerateToken/GenerateToken, outputTemplate=esignet/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generate token with Null in code VID, uniqueIdentifier=TC_ESignet_GenerateToken_46, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenIdForUrlEncoded.test(SimplePostForAutoGenIdForUrlEncoded.java:102)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_GenerateToken_Vid_Null_Grant_type_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenIdForUrlEncoded |
| Testcase Input |
| testCaseName=ESignet_GenerateToken_Vid_Null_Grant_type_Neg, endPoint=$GETENDPOINTFROMWELLKNOWN$, role=resident, templateFields=null, input={ "grant_type": "null", "code": "$ID:AuthorizationCode_Vid_All_Valid_Smoke_sid_code$", "client_id": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "client_assertion_type": "urn:ietf:params:oauth:client-assertion-type:jwt-bearer", "client_assertion": "$CLIENT_ASSERTION_JWK$", "redirect_uri": "$IDPREDIRECTURI$" }, output={ "error": "unsupported_grant_type" }, inputTemplate=esignet/GenerateToken/GenerateToken, outputTemplate=esignet/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generate token with Null in grant_type VID, uniqueIdentifier=TC_ESignet_GenerateToken_40, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenIdForUrlEncoded.test(SimplePostForAutoGenIdForUrlEncoded.java:102)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_GenerateToken_Vid_Null_Redirect_uri_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenIdForUrlEncoded |
| Testcase Input |
| testCaseName=ESignet_GenerateToken_Vid_Null_Redirect_uri_Neg, endPoint=$GETENDPOINTFROMWELLKNOWN$, role=resident, templateFields=null, input={ "grant_type": "authorization_code", "code": "$ID:AuthorizationCode_Vid_All_Valid_Smoke_sid_code$", "client_id": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "client_assertion_type": "urn:ietf:params:oauth:client-assertion-type:jwt-bearer", "client_assertion": "$CLIENT_ASSERTION_JWK$", "redirect_uri": "null" }, output={ "error": "invalid_request" }, inputTemplate=esignet/GenerateToken/GenerateToken, outputTemplate=esignet/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generate token with Null in redirect uri VID, uniqueIdentifier=TC_ESignet_GenerateToken_51, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenIdForUrlEncoded.test(SimplePostForAutoGenIdForUrlEncoded.java:102)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_GenerateToken_Vid_SpaceFirst_ClientAssertionType_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenIdForUrlEncoded |
| Testcase Input |
| testCaseName=ESignet_GenerateToken_Vid_SpaceFirst_ClientAssertionType_Neg, endPoint=$GETENDPOINTFROMWELLKNOWN$, role=resident, templateFields=null, input={ "grant_type": "authorization_code", "code": "$ID:AuthorizationCode_Vid_All_Valid_Smoke_sid_code$", "client_id": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "client_assertion_type": " urn:ietf:params:oauth:client-assertion-type:jwt-bearer", "client_assertion": "$CLIENT_ASSERTION_JWK$", "redirect_uri": "$IDPREDIRECTURI$" }, output={ "error": "invalid_client" }, inputTemplate=esignet/GenerateToken/GenerateToken, outputTemplate=esignet/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generate token with space in the beginning of ClientAssertionType VID, uniqueIdentifier=TC_ESignet_GenerateToken_56, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenIdForUrlEncoded.test(SimplePostForAutoGenIdForUrlEncoded.java:102)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_GenerateToken_Vid_SpaceFirst_Grant_type_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenIdForUrlEncoded |
| Testcase Input |
| testCaseName=ESignet_GenerateToken_Vid_SpaceFirst_Grant_type_Neg, endPoint=$GETENDPOINTFROMWELLKNOWN$, role=resident, templateFields=null, input={ "grant_type": " authorization_code", "code": "$ID:AuthorizationCode_Vid_All_Valid_Smoke_sid_code$", "client_id": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "client_assertion_type": "urn:ietf:params:oauth:client-assertion-type:jwt-bearer", "client_assertion": "$CLIENT_ASSERTION_JWK$", "redirect_uri": "$IDPREDIRECTURI$" }, output={ "error": "unsupported_grant_type" }, inputTemplate=esignet/GenerateToken/GenerateToken, outputTemplate=esignet/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generate token with space in the beginning of grant_type VID, uniqueIdentifier=TC_ESignet_GenerateToken_41, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenIdForUrlEncoded.test(SimplePostForAutoGenIdForUrlEncoded.java:102)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_GenerateToken_Vid_SpaceLast_ClientAssertionType_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenIdForUrlEncoded |
| Testcase Input |
| testCaseName=ESignet_GenerateToken_Vid_SpaceLast_ClientAssertionType_Neg, endPoint=$GETENDPOINTFROMWELLKNOWN$, role=resident, templateFields=null, input={ "grant_type": "authorization_code", "code": "$ID:AuthorizationCode_Vid_All_Valid_Smoke_sid_code$", "client_id": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "client_assertion_type": "urn:ietf:params:oauth:client-assertion-type:jwt-bearer ", "client_assertion": "$CLIENT_ASSERTION_JWK$", "redirect_uri": "$IDPREDIRECTURI$" }, output={ "error": "invalid_client" }, inputTemplate=esignet/GenerateToken/GenerateToken, outputTemplate=esignet/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generate token with space in the end of ClientAssertionType VID, uniqueIdentifier=TC_ESignet_GenerateToken_57, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenIdForUrlEncoded.test(SimplePostForAutoGenIdForUrlEncoded.java:102)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_GenerateToken_Vid_SpaceLast_Grant_type_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenIdForUrlEncoded |
| Testcase Input |
| testCaseName=ESignet_GenerateToken_Vid_SpaceLast_Grant_type_Neg, endPoint=$GETENDPOINTFROMWELLKNOWN$, role=resident, templateFields=null, input={ "grant_type": "authorization_code ", "code": "$ID:AuthorizationCode_Vid_All_Valid_Smoke_sid_code$", "client_id": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "client_assertion_type": "urn:ietf:params:oauth:client-assertion-type:jwt-bearer", "client_assertion": "$CLIENT_ASSERTION_JWK$", "redirect_uri": "$IDPREDIRECTURI$" }, output={ "error": "unsupported_grant_type" }, inputTemplate=esignet/GenerateToken/GenerateToken, outputTemplate=esignet/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generate token with space in the end of grant_type VID, uniqueIdentifier=TC_ESignet_GenerateToken_42, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenIdForUrlEncoded.test(SimplePostForAutoGenIdForUrlEncoded.java:102)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_GenerateToken_Vid_Used_Code_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenIdForUrlEncoded |
| Testcase Input |
| testCaseName=ESignet_GenerateToken_Vid_Used_Code_Neg, endPoint=$GETENDPOINTFROMWELLKNOWN$, role=resident, templateFields=null, input={ "grant_type": "authorization_code", "code": "$ID:AuthorizationCode_Vid_All_Valid_Smoke_sid_code$", "client_id": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "client_assertion_type": "urn:ietf:params:oauth:client-assertion-type:jwt-bearer", "client_assertion": "$CLIENT_ASSERTION_JWK$", "redirect_uri": "$IDPREDIRECTURI$" }, output={ "error": "invalid_grant" }, inputTemplate=esignet/GenerateToken/GenerateToken, outputTemplate=esignet/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generate token with used code VID, uniqueIdentifier=TC_ESignet_GenerateToken_47, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenIdForUrlEncoded.test(SimplePostForAutoGenIdForUrlEncoded.java:102)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_GenerateToken_Vid_Valid_Smoke_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenIdForUrlEncoded |
| Testcase Input |
| testCaseName=ESignet_GenerateToken_Vid_Valid_Smoke_sid, endPoint=$GETENDPOINTFROMWELLKNOWN$, role=resident, templateFields=null, input={ "grant_type": "authorization_code", "code": "$ID:AuthorizationCode_Vid_All_Valid_Smoke_sid_code$", "client_id": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "client_assertion_type": "urn:ietf:params:oauth:client-assertion-type:jwt-bearer", "client_assertion": "$CLIENT_ASSERTION_JWK$", "redirect_uri": "$IDPREDIRECTURI$" }, output={ "token_type": "Bearer" }, inputTemplate=esignet/GenerateToken/GenerateToken, outputTemplate=esignet/GenerateToken/GenerateTokenResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generate token with all valid details VID, uniqueIdentifier=TC_ESignet_GenerateToken_32, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenIdForUrlEncoded.test(SimplePostForAutoGenIdForUrlEncoded.java:102)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_GenerateToken_uin_Empty_ClientAssertionType_Neg |
| Testcase Dependency |
| [TC_ESignet_AuthorizationCode_01, TC_ESignet_OAuthDetailsRequest_01, TC_ESignet_CreateOIDCClient_01] |
| Class Name |
| SimplePostForAutoGenIdForUrlEncoded |
| Testcase Input |
| testCaseName=ESignet_GenerateToken_uin_Empty_ClientAssertionType_Neg, endPoint=$GETENDPOINTFROMWELLKNOWN$, role=resident, templateFields=null, input={ "grant_type": "authorization_code", "code": "$ID:AuthorizationCode_uin_All_Valid_Smoke_sid_code$", "client_id": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "client_assertion_type": "", "client_assertion": "$CLIENT_ASSERTION_JWK$", "redirect_uri": "$IDPREDIRECTURI$" }, output={ "error": "invalid_client" }, inputTemplate=esignet/GenerateToken/GenerateToken, outputTemplate=esignet/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generate token with empty value in client assertion type UIN, uniqueIdentifier=TC_ESignet_GenerateToken_23, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_GenerateToken_uin_Empty_ClientAssertion_Neg |
| Testcase Dependency |
| [TC_ESignet_AuthorizationCode_01, TC_ESignet_OAuthDetailsRequest_01, TC_ESignet_CreateOIDCClient_01] |
| Class Name |
| SimplePostForAutoGenIdForUrlEncoded |
| Testcase Input |
| testCaseName=ESignet_GenerateToken_uin_Empty_ClientAssertion_Neg, endPoint=$GETENDPOINTFROMWELLKNOWN$, role=resident, templateFields=null, input={ "grant_type": "authorization_code", "code": "$ID:AuthorizationCode_uin_All_Valid_Smoke_sid_code$", "client_id": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "client_assertion_type": "urn:ietf:params:oauth:client-assertion-type:jwt-bearer", "client_assertion": "", "redirect_uri": "$IDPREDIRECTURI$" }, output={ "error": "invalid_client" }, inputTemplate=esignet/GenerateToken/GenerateToken, outputTemplate=esignet/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generate token with empty value in client assertion UIN, uniqueIdentifier=TC_ESignet_GenerateToken_30, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_GenerateToken_uin_Empty_ClientId_Neg |
| Testcase Dependency |
| [TC_ESignet_AuthorizationCode_01, TC_ESignet_OAuthDetailsRequest_01, TC_ESignet_CreateOIDCClient_01] |
| Class Name |
| SimplePostForAutoGenIdForUrlEncoded |
| Testcase Input |
| testCaseName=ESignet_GenerateToken_uin_Empty_ClientId_Neg, endPoint=$GETENDPOINTFROMWELLKNOWN$, role=resident, templateFields=null, input={ "grant_type": "authorization_code", "code": "$ID:AuthorizationCode_uin_All_Valid_Smoke_sid_code$", "client_id": "", "client_assertion_type": "urn:ietf:params:oauth:client-assertion-type:jwt-bearer", "client_assertion": "$CLIENT_ASSERTION_JWK$", "redirect_uri": "$IDPREDIRECTURI$" }, output={ "error": "invalid_grant" }, inputTemplate=esignet/GenerateToken/GenerateToken, outputTemplate=esignet/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generate token with empty value in ClientId UIN, uniqueIdentifier=TC_ESignet_GenerateToken_05, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_GenerateToken_uin_Empty_Code_Neg |
| Testcase Dependency |
| [TC_ESignet_CreateOIDCClient_01] |
| Class Name |
| SimplePostForAutoGenIdForUrlEncoded |
| Testcase Input |
| testCaseName=ESignet_GenerateToken_uin_Empty_Code_Neg, endPoint=$GETENDPOINTFROMWELLKNOWN$, role=resident, templateFields=null, input={ "grant_type": "authorization_code", "code": "", "client_id": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "client_assertion_type": "urn:ietf:params:oauth:client-assertion-type:jwt-bearer", "client_assertion": "$CLIENT_ASSERTION_JWK$", "redirect_uri": "$IDPREDIRECTURI$" }, output={ "error": "invalid_grant" }, inputTemplate=esignet/GenerateToken/GenerateToken, outputTemplate=esignet/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generate token with empty value in code UIN, uniqueIdentifier=TC_ESignet_GenerateToken_14, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_GenerateToken_uin_Empty_Grant_type_Neg |
| Testcase Dependency |
| [TC_ESignet_AuthorizationCode_01, TC_ESignet_OAuthDetailsRequest_01, TC_ESignet_CreateOIDCClient_01] |
| Class Name |
| SimplePostForAutoGenIdForUrlEncoded |
| Testcase Input |
| testCaseName=ESignet_GenerateToken_uin_Empty_Grant_type_Neg, endPoint=$GETENDPOINTFROMWELLKNOWN$, role=resident, templateFields=null, input={ "grant_type": "", "code": "$ID:AuthorizationCode_uin_All_Valid_Smoke_sid_code$", "client_id": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "client_assertion_type": "urn:ietf:params:oauth:client-assertion-type:jwt-bearer", "client_assertion": "$CLIENT_ASSERTION_JWK$", "redirect_uri": "$IDPREDIRECTURI$" }, output={ "error": "unsupported_grant_type" }, inputTemplate=esignet/GenerateToken/GenerateToken, outputTemplate=esignet/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generate token with empty grant_type UIN, uniqueIdentifier=TC_ESignet_GenerateToken_08, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_GenerateToken_uin_Empty_Redirect_uri_Neg |
| Testcase Dependency |
| [TC_ESignet_AuthorizationCode_01, TC_ESignet_OAuthDetailsRequest_01, TC_ESignet_CreateOIDCClient_01] |
| Class Name |
| SimplePostForAutoGenIdForUrlEncoded |
| Testcase Input |
| testCaseName=ESignet_GenerateToken_uin_Empty_Redirect_uri_Neg, endPoint=$GETENDPOINTFROMWELLKNOWN$, role=resident, templateFields=null, input={ "grant_type": "authorization_code", "code": "$ID:AuthorizationCode_uin_All_Valid_Smoke_sid_code$", "client_id": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "client_assertion_type": "urn:ietf:params:oauth:client-assertion-type:jwt-bearer", "client_assertion": "$CLIENT_ASSERTION_JWK$", "redirect_uri": "" }, output={ "error": "invalid_request" }, inputTemplate=esignet/GenerateToken/GenerateToken, outputTemplate=esignet/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generate token with empty value in redirect uri UIN, uniqueIdentifier=TC_ESignet_GenerateToken_19, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_GenerateToken_uin_Incorrect_ClientAssertionType_Neg |
| Testcase Dependency |
| [TC_ESignet_AuthorizationCode_01, TC_ESignet_OAuthDetailsRequest_01, TC_ESignet_CreateOIDCClient_01] |
| Class Name |
| SimplePostForAutoGenIdForUrlEncoded |
| Testcase Input |
| testCaseName=ESignet_GenerateToken_uin_Incorrect_ClientAssertionType_Neg, endPoint=$GETENDPOINTFROMWELLKNOWN$, role=resident, templateFields=null, input={ "grant_type": "authorization_code", "code": "$ID:AuthorizationCode_uin_All_Valid_Smoke_sid_code$", "client_id": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "client_assertion_type": "urn ietf params oauth client-assertion-type jwt-bearer", "client_assertion": "$CLIENT_ASSERTION_JWK$", "redirect_uri": "$IDPREDIRECTURI$" }, output={ "error": "invalid_client" }, inputTemplate=esignet/GenerateToken/GenerateToken, outputTemplate=esignet/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generate token with incorrect client assertion type UIN, uniqueIdentifier=TC_ESignet_GenerateToken_21, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_GenerateToken_uin_Invalid_ClientAssertionType_Neg |
| Testcase Dependency |
| [TC_ESignet_AuthorizationCode_01, TC_ESignet_OAuthDetailsRequest_01, TC_ESignet_CreateOIDCClient_01] |
| Class Name |
| SimplePostForAutoGenIdForUrlEncoded |
| Testcase Input |
| testCaseName=ESignet_GenerateToken_uin_Invalid_ClientAssertionType_Neg, endPoint=$GETENDPOINTFROMWELLKNOWN$, role=resident, templateFields=null, input={ "grant_type": "authorization_code", "code": "$ID:AuthorizationCode_uin_All_Valid_Smoke_sid_code$", "client_id": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "client_assertion_type": "sdhb$$#@", "client_assertion": "$CLIENT_ASSERTION_JWK$", "redirect_uri": "$IDPREDIRECTURI$" }, output={ "error": "invalid_client" }, inputTemplate=esignet/GenerateToken/GenerateToken, outputTemplate=esignet/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generate token with invalid client assertion type UIN, uniqueIdentifier=TC_ESignet_GenerateToken_27, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_GenerateToken_uin_Invalid_ClientAssertion_Neg |
| Testcase Dependency |
| [TC_ESignet_AuthorizationCode_01, TC_ESignet_OAuthDetailsRequest_01, TC_ESignet_CreateOIDCClient_01] |
| Class Name |
| SimplePostForAutoGenIdForUrlEncoded |
| Testcase Input |
| testCaseName=ESignet_GenerateToken_uin_Invalid_ClientAssertion_Neg, endPoint=$GETENDPOINTFROMWELLKNOWN$, role=resident, templateFields=null, input={ "grant_type": "authorization_code", "code": "$ID:AuthorizationCode_uin_All_Valid_Smoke_sid_code$", "client_id": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "client_assertion_type": "urn:ietf:params:oauth:client-assertion-type:jwt-bearer", "client_assertion": "CLIENT_ASSERTION_JWK", "redirect_uri": "$IDPREDIRECTURI$" }, output={ "error": "invalid_grant" }, inputTemplate=esignet/GenerateToken/GenerateToken, outputTemplate=esignet/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generate token with invalid client assertion UIN, uniqueIdentifier=TC_ESignet_GenerateToken_28, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_GenerateToken_uin_Invalid_ClientId_Neg |
| Testcase Dependency |
| [TC_ESignet_AuthorizationCode_01, TC_ESignet_OAuthDetailsRequest_01, TC_ESignet_CreateOIDCClient_01] |
| Class Name |
| SimplePostForAutoGenIdForUrlEncoded |
| Testcase Input |
| testCaseName=ESignet_GenerateToken_uin_Invalid_ClientId_Neg, endPoint=$GETENDPOINTFROMWELLKNOWN$, role=resident, templateFields=null, input={ "grant_type": "authorization_code", "code": "$ID:AuthorizationCode_uin_All_Valid_Smoke_sid_code$", "client_id": "Client_clientId", "client_assertion_type": "urn:ietf:params:oauth:client-assertion-type:jwt-bearer", "client_assertion": "$CLIENT_ASSERTION_JWK$", "redirect_uri": "$IDPREDIRECTURI$" }, output={ "error": "invalid_grant" }, inputTemplate=esignet/GenerateToken/GenerateToken, outputTemplate=esignet/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generate token with invalid ClientId UIN, uniqueIdentifier=TC_ESignet_GenerateToken_02, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_GenerateToken_uin_Invalid_Code_Neg |
| Testcase Dependency |
| [TC_ESignet_CreateOIDCClient_01] |
| Class Name |
| SimplePostForAutoGenIdForUrlEncoded |
| Testcase Input |
| testCaseName=ESignet_GenerateToken_uin_Invalid_Code_Neg, endPoint=$GETENDPOINTFROMWELLKNOWN$, role=resident, templateFields=null, input={ "grant_type": "authorization_code", "code": "AuthorizationCode_uin_All_Valid_Smoke_sid_code", "client_id": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "client_assertion_type": "urn:ietf:params:oauth:client-assertion-type:jwt-bearer", "client_assertion": "$CLIENT_ASSERTION_JWK$", "redirect_uri": "$IDPREDIRECTURI$" }, output={ "error": "invalid_grant" }, inputTemplate=esignet/GenerateToken/GenerateToken, outputTemplate=esignet/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generate token with invalid code UIN, uniqueIdentifier=TC_ESignet_GenerateToken_12, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_GenerateToken_uin_Invalid_Grant_type_Neg |
| Testcase Dependency |
| [TC_ESignet_AuthorizationCode_01, TC_ESignet_OAuthDetailsRequest_01, TC_ESignet_CreateOIDCClient_01] |
| Class Name |
| SimplePostForAutoGenIdForUrlEncoded |
| Testcase Input |
| testCaseName=ESignet_GenerateToken_uin_Invalid_Grant_type_Neg, endPoint=$GETENDPOINTFROMWELLKNOWN$, role=resident, templateFields=null, input={ "grant_type": "hbkd$#$@@", "code": "$ID:AuthorizationCode_uin_All_Valid_Smoke_sid_code$", "client_id": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "client_assertion_type": "urn:ietf:params:oauth:client-assertion-type:jwt-bearer", "client_assertion": "$CLIENT_ASSERTION_JWK$", "redirect_uri": "$IDPREDIRECTURI$" }, output={ "error": "unsupported_grant_type" }, inputTemplate=esignet/GenerateToken/GenerateToken, outputTemplate=esignet/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generate token with invalid grant_type UIN, uniqueIdentifier=TC_ESignet_GenerateToken_06, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_GenerateToken_uin_Invalid_Redirect_uri_Neg |
| Testcase Dependency |
| [TC_ESignet_AuthorizationCode_01, TC_ESignet_OAuthDetailsRequest_01, TC_ESignet_CreateOIDCClient_01] |
| Class Name |
| SimplePostForAutoGenIdForUrlEncoded |
| Testcase Input |
| testCaseName=ESignet_GenerateToken_uin_Invalid_Redirect_uri_Neg, endPoint=$GETENDPOINTFROMWELLKNOWN$, role=resident, templateFields=null, input={ "grant_type": "authorization_code", "code": "$ID:AuthorizationCode_uin_All_Valid_Smoke_sid_code$", "client_id": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "client_assertion_type": "urn:ietf:params:oauth:client-assertion-type:jwt-bearer", "client_assertion": "$CLIENT_ASSERTION_JWK$", "redirect_uri": "https://new-services.com/newprofile" }, output={ "error": "invalid_grant" }, inputTemplate=esignet/GenerateToken/GenerateToken, outputTemplate=esignet/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generate token with invalid redirect uri UIN, uniqueIdentifier=TC_ESignet_GenerateToken_17, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_GenerateToken_uin_Missing_ClientAssertionType_Neg |
| Testcase Dependency |
| [TC_ESignet_AuthorizationCode_01, TC_ESignet_OAuthDetailsRequest_01, TC_ESignet_CreateOIDCClient_01] |
| Class Name |
| SimplePostForAutoGenIdForUrlEncoded |
| Testcase Input |
| testCaseName=ESignet_GenerateToken_uin_Missing_ClientAssertionType_Neg, endPoint=$GETENDPOINTFROMWELLKNOWN$, role=resident, templateFields=null, input={ "grant_type": "authorization_code", "code": "$ID:AuthorizationCode_uin_All_Valid_Smoke_sid_code$", "client_id": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "client_assertion_type": "$REMOVE$", "client_assertion": "$CLIENT_ASSERTION_JWK$", "redirect_uri": "$IDPREDIRECTURI$" }, output={ "error": "invalid_client" }, inputTemplate=esignet/GenerateToken/GenerateToken, outputTemplate=esignet/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generate token without client assertion type UIN, uniqueIdentifier=TC_ESignet_GenerateToken_22, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_GenerateToken_uin_Missing_ClientAssertion_Neg |
| Testcase Dependency |
| [TC_ESignet_AuthorizationCode_01, TC_ESignet_OAuthDetailsRequest_01, TC_ESignet_CreateOIDCClient_01] |
| Class Name |
| SimplePostForAutoGenIdForUrlEncoded |
| Testcase Input |
| testCaseName=ESignet_GenerateToken_uin_Missing_ClientAssertion_Neg, endPoint=$GETENDPOINTFROMWELLKNOWN$, role=resident, templateFields=null, input={ "grant_type": "authorization_code", "code": "$ID:AuthorizationCode_uin_All_Valid_Smoke_sid_code$", "client_id": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "client_assertion_type": "urn:ietf:params:oauth:client-assertion-type:jwt-bearer", "client_assertion": "$REMOVE$", "redirect_uri": "$IDPREDIRECTURI$" }, output={ "error": "invalid_client" }, inputTemplate=esignet/GenerateToken/GenerateToken, outputTemplate=esignet/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generate token without client assertion UIN, uniqueIdentifier=TC_ESignet_GenerateToken_29, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_GenerateToken_uin_Missing_ClientId_Neg |
| Testcase Dependency |
| [TC_ESignet_AuthorizationCode_01, TC_ESignet_OAuthDetailsRequest_01, TC_ESignet_CreateOIDCClient_01] |
| Class Name |
| SimplePostForAutoGenIdForUrlEncoded |
| Testcase Input |
| testCaseName=ESignet_GenerateToken_uin_Missing_ClientId_Neg, endPoint=$GETENDPOINTFROMWELLKNOWN$, role=resident, templateFields=null, input={ "grant_type": "authorization_code", "code": "$ID:AuthorizationCode_uin_All_Valid_Smoke_sid_code$", "client_id": "$REMOVE$", "client_assertion_type": "urn:ietf:params:oauth:client-assertion-type:jwt-bearer", "client_assertion": "$CLIENT_ASSERTION_JWK$", "redirect_uri": "$IDPREDIRECTURI$" }, output={ "error": "invalid_grant" }, inputTemplate=esignet/GenerateToken/GenerateToken, outputTemplate=esignet/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generate token without ClientId UIN, uniqueIdentifier=TC_ESignet_GenerateToken_03, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_GenerateToken_uin_Missing_Code_Neg |
| Testcase Dependency |
| [TC_ESignet_CreateOIDCClient_01] |
| Class Name |
| SimplePostForAutoGenIdForUrlEncoded |
| Testcase Input |
| testCaseName=ESignet_GenerateToken_uin_Missing_Code_Neg, endPoint=$GETENDPOINTFROMWELLKNOWN$, role=resident, templateFields=null, input={ "grant_type": "authorization_code", "code": "$REMOVE$", "client_id": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "client_assertion_type": "urn:ietf:params:oauth:client-assertion-type:jwt-bearer", "client_assertion": "$CLIENT_ASSERTION_JWK$", "redirect_uri": "$IDPREDIRECTURI$" }, output={ "error": "invalid_grant" }, inputTemplate=esignet/GenerateToken/GenerateToken, outputTemplate=esignet/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generate token without code UIN, uniqueIdentifier=TC_ESignet_GenerateToken_13, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_GenerateToken_uin_Missing_Grant_type_Neg |
| Testcase Dependency |
| [TC_ESignet_AuthorizationCode_01, TC_ESignet_OAuthDetailsRequest_01, TC_ESignet_CreateOIDCClient_01] |
| Class Name |
| SimplePostForAutoGenIdForUrlEncoded |
| Testcase Input |
| testCaseName=ESignet_GenerateToken_uin_Missing_Grant_type_Neg, endPoint=$GETENDPOINTFROMWELLKNOWN$, role=resident, templateFields=null, input={ "grant_type": "$REMOVE$", "code": "$ID:AuthorizationCode_uin_All_Valid_Smoke_sid_code$", "client_id": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "client_assertion_type": "urn:ietf:params:oauth:client-assertion-type:jwt-bearer", "client_assertion": "$CLIENT_ASSERTION_JWK$", "redirect_uri": "$IDPREDIRECTURI$" }, output={ "error": "unsupported_grant_type" }, inputTemplate=esignet/GenerateToken/GenerateToken, outputTemplate=esignet/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generate token without grant_type UIN, uniqueIdentifier=TC_ESignet_GenerateToken_07, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_GenerateToken_uin_Missing_Redirect_uri_Neg |
| Testcase Dependency |
| [TC_ESignet_AuthorizationCode_01, TC_ESignet_OAuthDetailsRequest_01, TC_ESignet_CreateOIDCClient_01] |
| Class Name |
| SimplePostForAutoGenIdForUrlEncoded |
| Testcase Input |
| testCaseName=ESignet_GenerateToken_uin_Missing_Redirect_uri_Neg, endPoint=$GETENDPOINTFROMWELLKNOWN$, role=resident, templateFields=null, input={ "grant_type": "authorization_code", "code": "$ID:AuthorizationCode_uin_All_Valid_Smoke_sid_code$", "client_id": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "client_assertion_type": "urn:ietf:params:oauth:client-assertion-type:jwt-bearer", "client_assertion": "$CLIENT_ASSERTION_JWK$", "redirect_uri": "$REMOVE$" }, output={ "error": "invalid_request" }, inputTemplate=esignet/GenerateToken/GenerateToken, outputTemplate=esignet/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generate token without redirect uri UIN, uniqueIdentifier=TC_ESignet_GenerateToken_18, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_GenerateToken_uin_Null_ClientAssertionType_Neg |
| Testcase Dependency |
| [TC_ESignet_AuthorizationCode_01, TC_ESignet_OAuthDetailsRequest_01, TC_ESignet_CreateOIDCClient_01] |
| Class Name |
| SimplePostForAutoGenIdForUrlEncoded |
| Testcase Input |
| testCaseName=ESignet_GenerateToken_uin_Null_ClientAssertionType_Neg, endPoint=$GETENDPOINTFROMWELLKNOWN$, role=resident, templateFields=null, input={ "grant_type": "authorization_code", "code": "$ID:AuthorizationCode_uin_All_Valid_Smoke_sid_code$", "client_id": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "client_assertion_type": "null", "client_assertion": "$CLIENT_ASSERTION_JWK$", "redirect_uri": "$IDPREDIRECTURI$" }, output={ "error": "invalid_client" }, inputTemplate=esignet/GenerateToken/GenerateToken, outputTemplate=esignet/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generate token with Null in client assertion type UIN, uniqueIdentifier=TC_ESignet_GenerateToken_24, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_GenerateToken_uin_Null_ClientAssertion_Neg |
| Testcase Dependency |
| [TC_ESignet_AuthorizationCode_01, TC_ESignet_OAuthDetailsRequest_01, TC_ESignet_CreateOIDCClient_01] |
| Class Name |
| SimplePostForAutoGenIdForUrlEncoded |
| Testcase Input |
| testCaseName=ESignet_GenerateToken_uin_Null_ClientAssertion_Neg, endPoint=$GETENDPOINTFROMWELLKNOWN$, role=resident, templateFields=null, input={ "grant_type": "authorization_code", "code": "$ID:AuthorizationCode_uin_All_Valid_Smoke_sid_code$", "client_id": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "client_assertion_type": "urn:ietf:params:oauth:client-assertion-type:jwt-bearer", "client_assertion": "null", "redirect_uri": "$IDPREDIRECTURI$" }, output={ "error": "invalid_grant" }, inputTemplate=esignet/GenerateToken/GenerateToken, outputTemplate=esignet/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generate token with Null in client assertion UIN, uniqueIdentifier=TC_ESignet_GenerateToken_31, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_GenerateToken_uin_Null_ClientId_Neg |
| Testcase Dependency |
| [TC_ESignet_AuthorizationCode_01, TC_ESignet_OAuthDetailsRequest_01, TC_ESignet_CreateOIDCClient_01] |
| Class Name |
| SimplePostForAutoGenIdForUrlEncoded |
| Testcase Input |
| testCaseName=ESignet_GenerateToken_uin_Null_ClientId_Neg, endPoint=$GETENDPOINTFROMWELLKNOWN$, role=resident, templateFields=null, input={ "grant_type": "authorization_code", "code": "$ID:AuthorizationCode_uin_All_Valid_Smoke_sid_code$", "client_id": "null", "client_assertion_type": "urn:ietf:params:oauth:client-assertion-type:jwt-bearer", "client_assertion": "$CLIENT_ASSERTION_JWK$", "redirect_uri": "$IDPREDIRECTURI$" }, output={ "error": "invalid_grant" }, inputTemplate=esignet/GenerateToken/GenerateToken, outputTemplate=esignet/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generate token with Null in ClientId UIN, uniqueIdentifier=TC_ESignet_GenerateToken_04, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_GenerateToken_uin_Null_Code_Neg |
| Testcase Dependency |
| [TC_ESignet_CreateOIDCClient_01] |
| Class Name |
| SimplePostForAutoGenIdForUrlEncoded |
| Testcase Input |
| testCaseName=ESignet_GenerateToken_uin_Null_Code_Neg, endPoint=$GETENDPOINTFROMWELLKNOWN$, role=resident, templateFields=null, input={ "grant_type": "authorization_code", "code": "null", "client_id": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "client_assertion_type": "urn:ietf:params:oauth:client-assertion-type:jwt-bearer", "client_assertion": "$CLIENT_ASSERTION_JWK$", "redirect_uri": "$IDPREDIRECTURI$" }, output={ "error": "invalid_grant" }, inputTemplate=esignet/GenerateToken/GenerateToken, outputTemplate=esignet/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generate token with Null in code UIN, uniqueIdentifier=TC_ESignet_GenerateToken_15, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_GenerateToken_uin_Null_Grant_type_Neg |
| Testcase Dependency |
| [TC_ESignet_AuthorizationCode_01, TC_ESignet_OAuthDetailsRequest_01, TC_ESignet_CreateOIDCClient_01] |
| Class Name |
| SimplePostForAutoGenIdForUrlEncoded |
| Testcase Input |
| testCaseName=ESignet_GenerateToken_uin_Null_Grant_type_Neg, endPoint=$GETENDPOINTFROMWELLKNOWN$, role=resident, templateFields=null, input={ "grant_type": "null", "code": "$ID:AuthorizationCode_uin_All_Valid_Smoke_sid_code$", "client_id": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "client_assertion_type": "urn:ietf:params:oauth:client-assertion-type:jwt-bearer", "client_assertion": "$CLIENT_ASSERTION_JWK$", "redirect_uri": "$IDPREDIRECTURI$" }, output={ "error": "unsupported_grant_type" }, inputTemplate=esignet/GenerateToken/GenerateToken, outputTemplate=esignet/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generate token with Null in grant_type UIN, uniqueIdentifier=TC_ESignet_GenerateToken_09, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_GenerateToken_uin_Null_Redirect_uri_Neg |
| Testcase Dependency |
| [TC_ESignet_AuthorizationCode_01, TC_ESignet_OAuthDetailsRequest_01, TC_ESignet_CreateOIDCClient_01] |
| Class Name |
| SimplePostForAutoGenIdForUrlEncoded |
| Testcase Input |
| testCaseName=ESignet_GenerateToken_uin_Null_Redirect_uri_Neg, endPoint=$GETENDPOINTFROMWELLKNOWN$, role=resident, templateFields=null, input={ "grant_type": "authorization_code", "code": "$ID:AuthorizationCode_uin_All_Valid_Smoke_sid_code$", "client_id": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "client_assertion_type": "urn:ietf:params:oauth:client-assertion-type:jwt-bearer", "client_assertion": "$CLIENT_ASSERTION_JWK$", "redirect_uri": "null" }, output={ "error": "invalid_request" }, inputTemplate=esignet/GenerateToken/GenerateToken, outputTemplate=esignet/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generate token with Null in redirect uri UIN, uniqueIdentifier=TC_ESignet_GenerateToken_20, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_GenerateToken_uin_SpaceFirst_ClientAssertionType_Neg |
| Testcase Dependency |
| [TC_ESignet_AuthorizationCode_01, TC_ESignet_OAuthDetailsRequest_01, TC_ESignet_CreateOIDCClient_01] |
| Class Name |
| SimplePostForAutoGenIdForUrlEncoded |
| Testcase Input |
| testCaseName=ESignet_GenerateToken_uin_SpaceFirst_ClientAssertionType_Neg, endPoint=$GETENDPOINTFROMWELLKNOWN$, role=resident, templateFields=null, input={ "grant_type": "authorization_code", "code": "$ID:AuthorizationCode_uin_All_Valid_Smoke_sid_code$", "client_id": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "client_assertion_type": " urn:ietf:params:oauth:client-assertion-type:jwt-bearer", "client_assertion": "$CLIENT_ASSERTION_JWK$", "redirect_uri": "$IDPREDIRECTURI$" }, output={ "error": "invalid_client" }, inputTemplate=esignet/GenerateToken/GenerateToken, outputTemplate=esignet/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generate token with space in the beginning of client assertion type UIN, uniqueIdentifier=TC_ESignet_GenerateToken_25, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_GenerateToken_uin_SpaceFirst_Grant_type_Neg |
| Testcase Dependency |
| [TC_ESignet_AuthorizationCode_01, TC_ESignet_OAuthDetailsRequest_01, TC_ESignet_CreateOIDCClient_01] |
| Class Name |
| SimplePostForAutoGenIdForUrlEncoded |
| Testcase Input |
| testCaseName=ESignet_GenerateToken_uin_SpaceFirst_Grant_type_Neg, endPoint=$GETENDPOINTFROMWELLKNOWN$, role=resident, templateFields=null, input={ "grant_type": " authorization_code", "code": "$ID:AuthorizationCode_uin_All_Valid_Smoke_sid_code$", "client_id": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "client_assertion_type": "urn:ietf:params:oauth:client-assertion-type:jwt-bearer", "client_assertion": "$CLIENT_ASSERTION_JWK$", "redirect_uri": "$IDPREDIRECTURI$" }, output={ "error": "unsupported_grant_type" }, inputTemplate=esignet/GenerateToken/GenerateToken, outputTemplate=esignet/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generate token with space in the beginning of grant_type UIN, uniqueIdentifier=TC_ESignet_GenerateToken_10, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_GenerateToken_uin_SpaceLast_ClientAssertionType_Neg |
| Testcase Dependency |
| [TC_ESignet_AuthorizationCode_01, TC_ESignet_OAuthDetailsRequest_01, TC_ESignet_CreateOIDCClient_01] |
| Class Name |
| SimplePostForAutoGenIdForUrlEncoded |
| Testcase Input |
| testCaseName=ESignet_GenerateToken_uin_SpaceLast_ClientAssertionType_Neg, endPoint=$GETENDPOINTFROMWELLKNOWN$, role=resident, templateFields=null, input={ "grant_type": "authorization_code", "code": "$ID:AuthorizationCode_uin_All_Valid_Smoke_sid_code$", "client_id": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "client_assertion_type": "urn:ietf:params:oauth:client-assertion-type:jwt-bearer ", "client_assertion": "$CLIENT_ASSERTION_JWK$", "redirect_uri": "$IDPREDIRECTURI$" }, output={ "error": "invalid_client" }, inputTemplate=esignet/GenerateToken/GenerateToken, outputTemplate=esignet/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generate token with space in the end of client assertion type UIN, uniqueIdentifier=TC_ESignet_GenerateToken_26, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_GenerateToken_uin_SpaceLast_Grant_type_Neg |
| Testcase Dependency |
| [TC_ESignet_AuthorizationCode_01, TC_ESignet_OAuthDetailsRequest_01, TC_ESignet_CreateOIDCClient_01] |
| Class Name |
| SimplePostForAutoGenIdForUrlEncoded |
| Testcase Input |
| testCaseName=ESignet_GenerateToken_uin_SpaceLast_Grant_type_Neg, endPoint=$GETENDPOINTFROMWELLKNOWN$, role=resident, templateFields=null, input={ "grant_type": "authorization_code ", "code": "$ID:AuthorizationCode_uin_All_Valid_Smoke_sid_code$", "client_id": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "client_assertion_type": "urn:ietf:params:oauth:client-assertion-type:jwt-bearer", "client_assertion": "$CLIENT_ASSERTION_JWK$", "redirect_uri": "$IDPREDIRECTURI$" }, output={ "error": "unsupported_grant_type" }, inputTemplate=esignet/GenerateToken/GenerateToken, outputTemplate=esignet/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generate token with space in the end of grant_type UIN, uniqueIdentifier=TC_ESignet_GenerateToken_11, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_GenerateToken_uin_Used_Code_Neg |
| Testcase Dependency |
| [TC_ESignet_AuthorizationCode_01, TC_ESignet_OAuthDetailsRequest_01, TC_ESignet_CreateOIDCClient_01] |
| Class Name |
| SimplePostForAutoGenIdForUrlEncoded |
| Testcase Input |
| testCaseName=ESignet_GenerateToken_uin_Used_Code_Neg, endPoint=$GETENDPOINTFROMWELLKNOWN$, role=resident, templateFields=null, input={ "grant_type": "authorization_code", "code": "$ID:AuthorizationCode_uin_All_Valid_Smoke_sid_code$", "client_id": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "client_assertion_type": "urn:ietf:params:oauth:client-assertion-type:jwt-bearer", "client_assertion": "$CLIENT_ASSERTION_JWK$", "redirect_uri": "$IDPREDIRECTURI$" }, output={ "error": "invalid_grant" }, inputTemplate=esignet/GenerateToken/GenerateToken, outputTemplate=esignet/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generate token with used code UIN, uniqueIdentifier=TC_ESignet_GenerateToken_16, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_GenerateToken_uin_Valid_Smoke_sid |
| Testcase Dependency |
| [TC_ESignet_AuthorizationCode_01, TC_ESignet_OAuthDetailsRequest_01, TC_ESignet_CreateOIDCClient_01] |
| Class Name |
| SimplePostForAutoGenIdForUrlEncoded |
| Testcase Input |
| testCaseName=ESignet_GenerateToken_uin_Valid_Smoke_sid, endPoint=$GETENDPOINTFROMWELLKNOWN$, role=resident, templateFields=null, input={ "grant_type": "authorization_code", "code": "$ID:AuthorizationCode_uin_All_Valid_Smoke_sid_code$", "client_id": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "client_assertion_type": "urn:ietf:params:oauth:client-assertion-type:jwt-bearer", "client_assertion": "$CLIENT_ASSERTION_JWK$", "redirect_uri": "$IDPREDIRECTURI$" }, output={ "token_type": "Bearer" }, inputTemplate=esignet/GenerateToken/GenerateToken, outputTemplate=esignet/GenerateToken/GenerateTokenResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generate token with all valid details UIN, uniqueIdentifier=TC_ESignet_GenerateToken_01, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_GetOidcUserInfo_Vid_IdpAccessToken_StatusCode_Invalid_Token_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=ESignet_GetOidcUserInfo_Vid_IdpAccessToken_StatusCode_Invalid_Token_Neg, endPoint=/v1/esignet/oidc/userinfo, role=resident, templateFields=null, input={ "idpAccessToken": "eyJraWQiOiJLeVRFWVJobkQwT0F2em1RTnZsQU85STBxMjBxcjhab3p3UHI5bEhCY0NnIiwiYWxnIjoiUlMyNTYifQ.eyJzdWIiOiJQVlJtZkRwZ1pKcXZMTWZZcTZwcUItTDNZQTZXR3dYZmxiTlJpVWF6THJjIiwiYXVkIjoibW9zaXA5MTE2NjkxMTMzMDI3MDQiLCJzY29wZSI6IiIsImlzcyI6Imh0dHBzOlwvXC9hcGkucWEtMTIxLm1vc2lwLm5ldFwvdjFcL2lkcCIsImV4cCI6MTY2OTExNDE3NCwiaWF0IjoxNjY5MTEzNTc0fQ.e-cJLhWtYyg8g-T1OrEYSTgH9QX8AzaqtwEjIZsv-63hCySkTcT7n61iHd5njr7eIVuOi7K4JSBKhHhQhThlBaWrdkyihQuTyefFOTAH9UUEow8_T1MSIDun3G6-ae61mfAUZG3IvR1X2AxsFm8oor4rCZd8QLE_-yS1z8LPAg8VzRNj0th1NV_A3jsjeCySzst-saAwzAnBGPm5GncoEuo3Ftxmy2UcVO0l3ncwzebC19DDarCHRx5eNCDK6Z7oRxvPBgUKNXOwnfDO2gbjUG3fq9xCWS3ZPf-G-iMX9PRWsl2Bp7K4Ej6b_Y0nLdOHdJuwH-kKKiZMSIAMkSg4ww" }, output=401, inputTemplate=esignet/GetOidcUserInfo/GetOidcUserInfo, outputTemplate=esignet/GetOidcUserInfo/GetOidcUserInfoResult, restMethod=get, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Get OIDC user info with invalid token VID, uniqueIdentifier=TC_ESignet_GetOidcUserInfo_04, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.GetWithParam.test(GetWithParam.java:96)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_GetOidcUserInfo_Vid_IdpAccessToken_StatusCode_Valid_Smoke_sid |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=ESignet_GetOidcUserInfo_Vid_IdpAccessToken_StatusCode_Valid_Smoke_sid, endPoint=/v1/esignet/oidc/userinfo, role=resident, templateFields=null, input={ "idpAccessToken": "$ID:GenerateToken_Vid_Valid_Smoke_sid_access_token$" }, output=200, inputTemplate=esignet/GetOidcUserInfo/GetOidcUserInfo, outputTemplate=esignet/GetOidcUserInfo/GetOidcUserInfoResult, restMethod=get, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Get OIDC user info with all valid details VID, uniqueIdentifier=TC_ESignet_GetOidcUserInfo_02, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: VID feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.GetWithParam.test(GetWithParam.java:96)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_GetOidcUserInfo_uin_IdpAccessToken_StatusCode_Invalid_Token_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=ESignet_GetOidcUserInfo_uin_IdpAccessToken_StatusCode_Invalid_Token_Neg, endPoint=/v1/esignet/oidc/userinfo, role=resident, templateFields=null, input={ "idpAccessToken": "eyJraWQiOiJLeVRFWVJobkQwT0F2em1RTnZsQU85STBxMjBxcjhab3p3UHI5bEhCY0NnIiwiYWxnIjoiUlMyNTYifQ.eyJzdWIiOiJQVlJtZkRwZ1pKcXZMTWZZcTZwcUItTDNZQTZXR3dYZmxiTlJpVWF6THJjIiwiYXVkIjoibW9zaXA5MTE2NjkxMTMzMDI3MDQiLCJzY29wZSI6IiIsImlzcyI6Imh0dHBzOlwvXC9hcGkucWEtMTIxLm1vc2lwLm5ldFwvdjFcL2lkcCIsImV4cCI6MTY2OTExNDE3NCwiaWF0IjoxNjY5MTEzNTc0fQ.e-cJLhWtYyg8g-T1OrEYSTgH9QX8AzaqtwEjIZsv-63hCySkTcT7n61iHd5njr7eIVuOi7K4JSBKhHhQhThlBaWrdkyihQuTyefFOTAH9UUEow8_T1MSIDun3G6-ae61mfAUZG3IvR1X2AxsFm8oor4rCZd8QLE_-yS1z8LPAg8VzRNj0th1NV_A3jsjeCySzst-saAwzAnBGPm5GncoEuo3Ftxmy2UcVO0l3ncwzebC19DDarCHRx5eNCDK6Z7oRxvPBgUKNXOwnfDO2gbjUG3fq9xCWS3ZPf-G-iMX9PRWsl2Bp7K4Ej6b_Y0nLdOHdJuwH-kKKiZMSIAMkSg4ww" }, output=401, inputTemplate=esignet/GetOidcUserInfo/GetOidcUserInfo, outputTemplate=esignet/GetOidcUserInfo/GetOidcUserInfoResult, restMethod=get, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Get OIDC user info with invalid token UIN, uniqueIdentifier=TC_ESignet_GetOidcUserInfo_03, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_GetOidcUserInfo_uin_IdpAccessToken_StatusCode_Valid_Smoke_sid |
| Testcase Dependency |
| [TC_ESignet_GenerateToken_01, TC_ESignet_AuthorizationCode_01, TC_ESignet_OAuthDetailsRequest_01, TC_ESignet_CreateOIDCClient_01] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=ESignet_GetOidcUserInfo_uin_IdpAccessToken_StatusCode_Valid_Smoke_sid, endPoint=/v1/esignet/oidc/userinfo, role=resident, templateFields=null, input={ "idpAccessToken": "$ID:GenerateToken_uin_Valid_Smoke_sid_access_token$" }, output=200, inputTemplate=esignet/GetOidcUserInfo/GetOidcUserInfo, outputTemplate=esignet/GetOidcUserInfo/GetOidcUserInfoResult, restMethod=get, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Get OIDC user info with all valid details UIN, uniqueIdentifier=TC_ESignet_GetOidcUserInfo_01, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_CreateOIDCClient_StatusCode_Diff_Token_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_CreateOIDCClient_StatusCode_Diff_Token_Neg, endPoint=/v1/esignet/client-mgmt/oidc-client, role=idrepo, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$RANDOMID$2", "clientName": "MOSIP OIDC Client", "logoUri": "https://health-services.com/logo.png", "relyingPartyId": "Bharathi-Inc", "redirectUris": "$IDPREDIRECTURI$", "publicKey": "$JWKKEY$", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{acrValues: "mosip:idp:acr:static-code"},{acrValues: "mosip:idp:acr:generated-code"}], "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt" }, output=403, inputTemplate=esignet/CreateOIDCClient/CreateOIDCClient, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=To create OIDC Client with different invalid token, uniqueIdentifier=TC_ESignet_CreateOIDCClient_06, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:210)
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:93)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_CreateOIDCClient_2_Same_RelyParty_Valid_Smoke_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_CreateOIDCClient_2_Same_RelyParty_Valid_Smoke_sid, endPoint=/v1/esignet/client-mgmt/oidc-client, role=partner, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$RANDOMID$2", "clientName": "MOSIP OIDC Client", "logoUri": "https://health-services.com/logo.png", "relyingPartyId": "Bharathi-Inc", "redirectUris": "$IDPREDIRECTURI$", "publicKey": "$JWKKEY$", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{acrValues: "mosip:idp:acr:static-code"},{acrValues: "mosip:idp:acr:generated-code"}], "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt" }, output={ "status": "ACTIVE" }, inputTemplate=esignet/CreateOIDCClient/CreateOIDCClient, outputTemplate=esignet/CreateOIDCClient/CreateOIDCClientResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=To create OIDC Client with two same relying party, uniqueIdentifier=TC_ESignet_CreateOIDCClient_02, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_CreateOIDCClient_Diff_RequestTime_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_CreateOIDCClient_Diff_RequestTime_Neg, endPoint=/v1/esignet/client-mgmt/oidc-client, role=partner, templateFields=null, input={ "requestTime": "2022-11-07T06:51:30.195Z", "clientId": "$RANDOMID$", "clientName": "MOSIP OIDC Client", "logoUri": "https://health-services.com/logo.png", "relyingPartyId": "Bharathi-Inc", "redirectUris": "$IDPREDIRECTURI$", "publicKey": "$JWKKEY$", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{acrValues: "mosip:idp:acr:static-code"},{acrValues: "mosip:idp:acr:generated-code"}], "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt" }, output={ "errors": [ { "errorCode": "invalid_request" } ] }, inputTemplate=esignet/CreateOIDCClient/CreateOIDCClient, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=To create OIDC Client with different requestTime, uniqueIdentifier=TC_ESignet_CreateOIDCClient_04, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_CreateOIDCClient_Empty_authContextRefs |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_CreateOIDCClient_Empty_authContextRefs, endPoint=/v1/esignet/client-mgmt/oidc-client, role=partner, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$RANDOMID$", "clientName": "MOSIP OIDC Client", "logoUri": "https://health-services.com/logo.png", "relyingPartyId": "Bharathi-Inc", "redirectUris": "$IDPREDIRECTURI$", "publicKey": "$JWKKEY$", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{acrValues: ""}], "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt" }, output={ "errors": [ { "errorCode": "invalid_acr" } ] }, inputTemplate=esignet/CreateOIDCClient/CreateOIDCClient, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=To create OIDC Client with missing authContextRefs, uniqueIdentifier=TC_ESignet_CreateOIDCClient_22, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_CreateOIDCClient_Empty_clientAuthMethods_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_CreateOIDCClient_Empty_clientAuthMethods_Neg, endPoint=/v1/esignet/client-mgmt/oidc-client, role=partner, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$RANDOMID$", "clientName": "MOSIP OIDC Client", "logoUri": "https://health-services.com/logo.png", "relyingPartyId": "Bharathi-Inc", "redirectUris": "$IDPREDIRECTURI$", "publicKey": "$JWKKEY$", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{acrValues: "mosip:idp:acr:static-code"},{acrValues: "mosip:idp:acr:generated-code"}], "grantTypes": "authorization_code", "clientAuthMethods": "" }, output={ "errors": [ { "errorCode": "invalid_client_auth" } ] }, inputTemplate=esignet/CreateOIDCClient/CreateOIDCClient, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=To create OIDC Client with an empty clientAuthMethods, uniqueIdentifier=TC_ESignet_CreateOIDCClient_31, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_CreateOIDCClient_Empty_grantTypes_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_CreateOIDCClient_Empty_grantTypes_Neg, endPoint=/v1/esignet/client-mgmt/oidc-client, role=partner, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$RANDOMID$", "clientName": "MOSIP OIDC Client", "logoUri": "https://health-services.com/logo.png", "relyingPartyId": "Bharathi-Inc", "redirectUris": "$IDPREDIRECTURI$", "publicKey": "$JWKKEY$", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{acrValues: "mosip:idp:acr:static-code"},{acrValues: "mosip:idp:acr:generated-code"}], "grantTypes": "", "clientAuthMethods": "private_key_jwt" }, output={ "errors": [ { "errorCode": "unsupported_grant_type" } ] }, inputTemplate=esignet/CreateOIDCClient/CreateOIDCClient, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=To create OIDC Client with an empty grantTypes, uniqueIdentifier=TC_ESignet_CreateOIDCClient_28, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_CreateOIDCClient_Exceding_Range_ClientId_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_CreateOIDCClient_Exceding_Range_ClientId_Neg, endPoint=/v1/esignet/client-mgmt/oidc-client, role=partner, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "8nr2xe4jlxa54n9okvcv1kbjjl7srfy3veqp88g2u1nn2do7za1svus4hdfj8nr2xe4jlxa54n9okvcv1kbjjl7srfy3veqp88g2u1nn2do7za1svus4hdfj", "clientName": "MOSIP OIDC Client", "logoUri": "https://health-services.com/logo.png", "relyingPartyId": "Bharathi-Inc", "redirectUris": "$IDPREDIRECTURI$", "publicKey": "$JWKKEY$", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{acrValues: "mosip:idp:acr:static-code"},{acrValues: "mosip:idp:acr:generated-code"}], "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt" }, output={ "errors": [ { "errorCode": "invalid_client_id" } ] }, inputTemplate=esignet/CreateOIDCClient/CreateOIDCClient, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=To create OIDC Client with exceding range clientId, uniqueIdentifier=TC_ESignet_CreateOIDCClient_08, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_CreateOIDCClient_Exceding_Range_ClientName_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_CreateOIDCClient_Exceding_Range_ClientName_Neg, endPoint=/v1/esignet/client-mgmt/oidc-client, role=partner, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "8nr2xe4jlxa54n9okvcv1", "clientName": "vc0neervbsu10dfbo2vu282lt0r9hf044b1q8wm957k97wpjmrmwz6kcbpv5p9zyocksfyg41u4rpm71hhqy29sqcixg1i0ed2aaxlfd9f5wtpf3py2igi3orhttvh6vqys16nmnke9qwjjr8byjflotzyw078t1azc9rvoftuhdis40mgy9uoyzoypwdbomdkjg3v9y216y7bfpiyoenhgaudirgn432u3c2x27z23zvd094m7ug4lvid8av6jhc24j", "logoUri": "https://health-services.com/logo.png", "relyingPartyId": "Bharathi-Inc", "redirectUris": "$IDPREDIRECTURI$", "publicKey": "$JWKKEY$", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{acrValues: "mosip:idp:acr:static-code"},{acrValues: "mosip:idp:acr:generated-code"}], "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt" }, output={ "errors": [ { "errorCode": "invalid_client_name" } ] }, inputTemplate=esignet/CreateOIDCClient/CreateOIDCClient, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=To create OIDC Client with exceding range clientName, uniqueIdentifier=TC_ESignet_CreateOIDCClient_10, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_CreateOIDCClient_Invalid_Exceding_Range_logoUri_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_CreateOIDCClient_Invalid_Exceding_Range_logoUri_Neg, endPoint=/v1/esignet/client-mgmt/oidc-client, role=partner, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "8nr2xe4jlxa54n9okvcv1", "clientName": "MOSIP OIDC CLIENT", "logoUri": "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", "relyingPartyId": "Bharathi-Inc", "redirectUris": "$IDPREDIRECTURI$", "publicKey": "$JWKKEY$", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{acrValues: "mosip:idp:acr:static-code"},{acrValues: "mosip:idp:acr:generated-code"}], "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt" }, output={ "errors": [ { "errorCode": "invalid_uri", "errorMessage": "request.logoUri: invalid_uri" } ] }, inputTemplate=esignet/CreateOIDCClient/CreateOIDCClient, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=To create OIDC Client with exceding range logoUri, uniqueIdentifier=TC_ESignet_CreateOIDCClient_17, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_CreateOIDCClient_Invalid_Exceding_Range_relyingPartyId_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_CreateOIDCClient_Invalid_Exceding_Range_relyingPartyId_Neg, endPoint=/v1/esignet/client-mgmt/oidc-client, role=partner, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "8nr2xe4jlxa54n9okvcv1", "clientName": "MOSIP OIDC CLIENT", "logoUri": "https://health-services.com/logo.png", "relyingPartyId": "8nr2xe4jlxa54n9okvcv1kbjjl7srfy3veqp88g2u1nn2do7za1svus4hdfj8nr2xe4jlxa54n9okvcv1kbjjl7srfy3veqp88g2u1nn2do7za1svus4hdfj", "redirectUris": "$IDPREDIRECTURI$", "publicKey": "$JWKKEY$", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{acrValues: "mosip:idp:acr:static-code"},{acrValues: "mosip:idp:acr:generated-code"}], "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt" }, output={ "errors": [ { "errorCode": "invalid_rp_id" } ] }, inputTemplate=esignet/CreateOIDCClient/CreateOIDCClient, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=To create OIDC Client with exceding range relyingpartyId, uniqueIdentifier=TC_ESignet_CreateOIDCClient_15, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_CreateOIDCClient_Invalid_Range_ClientId_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_CreateOIDCClient_Invalid_Range_ClientId_Neg, endPoint=/v1/esignet/client-mgmt/oidc-client, role=partner, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "", "clientName": "MOSIP OIDC Client", "logoUri": "https://health-services.com/logo.png", "relyingPartyId": "Bharathi-Inc", "redirectUris": "$IDPREDIRECTURI$", "publicKey": "$JWKKEY$", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{acrValues: "mosip:idp:acr:static-code"},{acrValues: "mosip:idp:acr:generated-code"}], "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt" }, output={ "errors": [ { "errorCode": "invalid_client_id" } ] }, inputTemplate=esignet/CreateOIDCClient/CreateOIDCClient, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=To create OIDC Client with invalid range clientId, uniqueIdentifier=TC_ESignet_CreateOIDCClient_07, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_CreateOIDCClient_Invalid_Range_ClientName_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_CreateOIDCClient_Invalid_Range_ClientName_Neg, endPoint=/v1/esignet/client-mgmt/oidc-client, role=partner, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "8nr2xe4jlxa54n9okvcv1", "clientName": "", "logoUri": "https://health-services.com/logo.png", "relyingPartyId": "Bharathi-Inc", "redirectUris": "$IDPREDIRECTURI$", "publicKey": "$JWKKEY$", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{acrValues: "mosip:idp:acr:static-code"},{acrValues: "mosip:idp:acr:generated-code"}], "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt" }, output={ "errors": [ { "errorCode": "invalid_client_name" } ] }, inputTemplate=esignet/CreateOIDCClient/CreateOIDCClient, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=To create OIDC Client with invalid range clientName, uniqueIdentifier=TC_ESignet_CreateOIDCClient_09, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_CreateOIDCClient_Invalid_Range_logoUri_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_CreateOIDCClient_Invalid_Range_logoUri_Neg, endPoint=/v1/esignet/client-mgmt/oidc-client, role=partner, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "8nr2xe4jlxa54n9okvcv1", "clientName": "MOSIP OIDC CLIENT", "logoUri": "", "relyingPartyId": "Bharathi-Inc", "redirectUris": "$IDPREDIRECTURI$", "publicKey": "$JWKKEY$", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{acrValues: "mosip:idp:acr:static-code"},{acrValues: "mosip:idp:acr:generated-code"}], "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt" }, output={ "errors": [ { "errorCode": "invalid_uri" } ] }, inputTemplate=esignet/CreateOIDCClient/CreateOIDCClient, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=To create OIDC Client with invalid range logoUri, uniqueIdentifier=TC_ESignet_CreateOIDCClient_16, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_CreateOIDCClient_Invalid_Range_relyingPartyId_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_CreateOIDCClient_Invalid_Range_relyingPartyId_Neg, endPoint=/v1/esignet/client-mgmt/oidc-client, role=partner, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "8nr2xe4jlxa54n9okvcv1", "clientName": "MOSIP OIDC CLIENT", "logoUri": "https://health-services.com/logo.png", "relyingPartyId": "", "redirectUris": "$IDPREDIRECTURI$", "publicKey": "$JWKKEY$", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{acrValues: "mosip:idp:acr:static-code"},{acrValues: "mosip:idp:acr:generated-code"}], "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt" }, output={ "errors": [ { "errorCode": "invalid_rp_id" } ] }, inputTemplate=esignet/CreateOIDCClient/CreateOIDCClient, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=To create OIDC Client with invalid range relyingpartyId, uniqueIdentifier=TC_ESignet_CreateOIDCClient_14, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_CreateOIDCClient_Invalid_RequestTime_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_CreateOIDCClient_Invalid_RequestTime_Neg, endPoint=/v1/esignet/client-mgmt/oidc-client, role=partner, templateFields=null, input={ "requestTime": "2022-11-07T06:51:30", "clientId": "$RANDOMID$", "clientName": "MOSIP OIDC Client", "logoUri": "https://health-services.com/logo.png", "relyingPartyId": "Bharathi-Inc", "redirectUris": "$IDPREDIRECTURI$", "publicKey": "$JWKKEY$", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{acrValues: "mosip:idp:acr:static-code"},{acrValues: "mosip:idp:acr:generated-code"}], "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt" }, output={ "errors": [ { "errorCode": "invalid_request" } ] }, inputTemplate=esignet/CreateOIDCClient/CreateOIDCClient, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=To create OIDC Client with invalid requestTime and all valid data, uniqueIdentifier=TC_ESignet_CreateOIDCClient_03, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_CreateOIDCClient_Invalid_SpaceFirst_ClientId_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_CreateOIDCClient_Invalid_SpaceFirst_ClientId_Neg, endPoint=/v1/esignet/client-mgmt/oidc-client, role=partner, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": " 8nr2xe4jlxa54n9okvcv12", "clientName": "MOSIP OIDC CLIENT", "logoUri": "https://health-services.com/logo.png", "relyingPartyId": "Bharathi-Inc", "redirectUris": "$IDPREDIRECTURI$", "publicKey": "$JWKKEY$", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{acrValues: "mosip:idp:acr:static-code"},{acrValues: "mosip:idp:acr:generated-code"}], "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt" }, output={ "errors": [ { "errorCode": "invalid_client_id" } ] }, inputTemplate=esignet/CreateOIDCClient/CreateOIDCClient, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=To create OIDC Client with a value starting with space in clientId, uniqueIdentifier=TC_ESignet_CreateOIDCClient_11, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_CreateOIDCClient_Invalid_SpaceLast_ClientId_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_CreateOIDCClient_Invalid_SpaceLast_ClientId_Neg, endPoint=/v1/esignet/client-mgmt/oidc-client, role=partner, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "8nr2xe4jlxa54n9okvcv12 ", "clientName": "MOSIP OIDC CLIENT", "logoUri": "https://health-services.com/logo.png", "relyingPartyId": "Bharathi-Inc", "redirectUris": "$IDPREDIRECTURI$", "publicKey": "$JWKKEY$", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{acrValues: "mosip:idp:acr:static-code"},{acrValues: "mosip:idp:acr:generated-code"}], "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt" }, output={ "errors": [ { "errorCode": "invalid_client_id" } ] }, inputTemplate=esignet/CreateOIDCClient/CreateOIDCClient, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=To create OIDC Client with a value ending with space in clientId, uniqueIdentifier=TC_ESignet_CreateOIDCClient_12, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_CreateOIDCClient_Invalid_SpaceMiddle_ClientId_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_CreateOIDCClient_Invalid_SpaceMiddle_ClientId_Neg, endPoint=/v1/esignet/client-mgmt/oidc-client, role=partner, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "8nr2xe4j lxa54n9okvcv12", "clientName": "MOSIP OIDC CLIENT", "logoUri": "https://health-services.com/logo.png", "relyingPartyId": "Bharathi-Inc", "redirectUris": "$IDPREDIRECTURI$", "publicKey": "$JWKKEY$", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{acrValues: "mosip:idp:acr:static-code"},{acrValues: "mosip:idp:acr:generated-code"}], "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt" }, output={ "errors": [ { "errorCode": "invalid_client_id" } ] }, inputTemplate=esignet/CreateOIDCClient/CreateOIDCClient, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=To create OIDC Client with clientId value having space in middle, uniqueIdentifier=TC_ESignet_CreateOIDCClient_13, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_CreateOIDCClient_Invalid_UserClaims |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_CreateOIDCClient_Invalid_UserClaims, endPoint=/v1/esignet/client-mgmt/oidc-client, role=partner, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$RA5315$", "clientName": "MOSIP OIDC Client", "logoUri": "https://health-services.com/logo.png", "relyingPartyId": "Bharathi-Inc", "redirectUris": "$IDPREDIRECTURI$", "publicKey": "$JWKKEY$", "userClaims1": "xyz", "userClaims2": "fd@gh.com", "userClaims3": "$REMOVE$", "userClaims4": "$REMOVE$", "userClaims5": "$REMOVE$", "authContextRefs": [{acrValues: "mosip:idp:acr:static-code"},{acrValues: "mosip:idp:acr:generated-code"}], "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt" }, output={ "errors": [ { "errorCode": "invalid_claim" } ] }, inputTemplate=esignet/CreateOIDCClient/CreateOIDCClient, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=To create OIDC Client with invalid userClaims, uniqueIdentifier=TC_ESignet_CreateOIDCClient_24, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_CreateOIDCClient_Invalid_authContextRefs |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_CreateOIDCClient_Invalid_authContextRefs, endPoint=/v1/esignet/client-mgmt/oidc-client, role=partner, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$RANDOMID$", "clientName": "MOSIP OIDC Client", "logoUri": "https://health-services.com/logo.png", "relyingPartyId": "Bharathi-Inc", "redirectUris": "$IDPREDIRECTURI$", "publicKey": "$JWKKEY$", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{acrValues: "invalid_acr"}], "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt" }, output={ "errors": [ { "errorCode": "invalid_acr" } ] }, inputTemplate=esignet/CreateOIDCClient/CreateOIDCClient, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=To create OIDC Client with invaid authContextRefs, uniqueIdentifier=TC_ESignet_CreateOIDCClient_19, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_CreateOIDCClient_Invalid_clientAuthMethods_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_CreateOIDCClient_Invalid_clientAuthMethods_Neg, endPoint=/v1/esignet/client-mgmt/oidc-client, role=partner, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$RANDOMID$", "clientName": "MOSIP OIDC Client", "logoUri": "https://health-services.com/logo.png", "relyingPartyId": "Bharathi-Inc", "redirectUris": "$IDPREDIRECTURI$", "publicKey": "$JWKKEY$", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{acrValues: "mosip:idp:acr:static-code"},{acrValues: "mosip:idp:acr:generated-code"}], "grantTypes": "authorization_code", "clientAuthMethods": "$$#@@A" }, output={ "errors": [ { "errorCode": "invalid_client_auth" } ] }, inputTemplate=esignet/CreateOIDCClient/CreateOIDCClient, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=To create OIDC Client with different invalid clientAuthMethods, uniqueIdentifier=TC_ESignet_CreateOIDCClient_30, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_CreateOIDCClient_Invalid_grantTypes_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_CreateOIDCClient_Invalid_grantTypes_Neg, endPoint=/v1/esignet/client-mgmt/oidc-client, role=partner, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$RANDOMID$", "clientName": "MOSIP OIDC Client", "logoUri": "https://health-services.com/logo.png", "relyingPartyId": "Bharathi-Inc", "redirectUris": "$IDPREDIRECTURI$", "publicKey": "$JWKKEY$", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{acrValues: "mosip:idp:acr:static-code"},{acrValues: "mosip:idp:acr:generated-code"}], "grantTypes": "$$@###$", "clientAuthMethods": "private_key_jwt" }, output={ "errors": [ { "errorCode": "unsupported_grant_type" } ] }, inputTemplate=esignet/CreateOIDCClient/CreateOIDCClient, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=To create OIDC Client with different invalid grantTypes, uniqueIdentifier=TC_ESignet_CreateOIDCClient_27, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_CreateOIDCClient_Invalid_publicKey |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_CreateOIDCClient_Invalid_publicKey, endPoint=/v1/esignet/client-mgmt/oidc-client, role=partner, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$RA5315$", "clientName": "MOSIP OIDC Client", "logoUri": "https://health-services.com/logo.png", "relyingPartyId": "Bharathi-Inc", "redirectUris": "$IDPREDIRECTURI$", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{acrValues: "mosip:idp:acr:static-code"},{acrValues: "mosip:idp:acr:generated-code"}], "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt" }, output={ "errors": [ { "errorCode": "invalid_public_key" } ] }, inputTemplate=esignet/CreateOIDCClient/CreateOIDCClientInvPublicKey, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=To create OIDC Client with invalid publicKey, uniqueIdentifier=TC_ESignet_CreateOIDCClient_23, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_CreateOIDCClient_Missing_authContextRefs |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_CreateOIDCClient_Missing_authContextRefs, endPoint=/v1/esignet/client-mgmt/oidc-client, role=partner, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$RANDOMID$", "clientName": "MOSIP OIDC Client", "logoUri": "https://health-services.com/logo.png", "relyingPartyId": "Bharathi-Inc", "redirectUris": "$IDPREDIRECTURI$", "publicKey": "$JWKKEY$", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{acrValues: "$REMOVE$"}], "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt" }, output={ "errors": [ { "errorCode": "invalid_acr" } ] }, inputTemplate=esignet/CreateOIDCClient/CreateOIDCClient, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=To create OIDC Client with missing authContextRefs, uniqueIdentifier=TC_ESignet_CreateOIDCClient_21, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_CreateOIDCClient_Missing_clientAuthMethods_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_CreateOIDCClient_Missing_clientAuthMethods_Neg, endPoint=/v1/esignet/client-mgmt/oidc-client, role=partner, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$RANDOMID$", "clientName": "MOSIP OIDC Client", "logoUri": "https://health-services.com/logo.png", "relyingPartyId": "Bharathi-Inc", "redirectUris": "$IDPREDIRECTURI$", "publicKey": "$JWKKEY$", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{acrValues: "mosip:idp:acr:static-code"},{acrValues: "mosip:idp:acr:generated-code"}], "grantTypes": "authorization_code", "clientAuthMethods": "$REMOVE$" }, output={ "errors": [ { "errorCode": "invalid_client_auth" } ] }, inputTemplate=esignet/CreateOIDCClient/CreateOIDCClient, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=To create OIDC Client with missing clientAuthMethods, uniqueIdentifier=TC_ESignet_CreateOIDCClient_29, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_CreateOIDCClient_Missing_grantTypes_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_CreateOIDCClient_Missing_grantTypes_Neg, endPoint=/v1/esignet/client-mgmt/oidc-client, role=partner, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$RANDOMID$", "clientName": "MOSIP OIDC Client", "logoUri": "https://health-services.com/logo.png", "relyingPartyId": "Bharathi-Inc", "redirectUris": "$IDPREDIRECTURI$", "publicKey": "$JWKKEY$", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{acrValues: "mosip:idp:acr:static-code"},{acrValues: "mosip:idp:acr:generated-code"}], "grantTypes": "$REMOVE$", "clientAuthMethods": "private_key_jwt" }, output={ "errors": [ { "errorCode": "unsupported_grant_type" } ] }, inputTemplate=esignet/CreateOIDCClient/CreateOIDCClient, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=To create OIDC Client with missing grantTypes, uniqueIdentifier=TC_ESignet_CreateOIDCClient_25, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_CreateOIDCClient_Missing_redirectUris |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_CreateOIDCClient_Missing_redirectUris, endPoint=/v1/esignet/client-mgmt/oidc-client, role=partner, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "2222222dddfggf", "clientName": "MOSIP OIDC Client", "logoUri": "https://health-services.com/logo.png", "relyingPartyId": "Bharathi-Inc", "redirectUris": "$REMOVE$", "publicKey": "$JWKKEY$", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{acrValues: "mosip:idp:acr:static-code"},{acrValues: "mosip:idp:acr:generated-code"}], "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt" }, output={ "errors": [ { "errorCode": "invalid_redirect_uri" } ] }, inputTemplate=esignet/CreateOIDCClient/CreateOIDCClient, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=To create OIDC Client with with missing redirectUris, uniqueIdentifier=TC_ESignet_CreateOIDCClient_18, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_CreateOIDCClient_Null_authContextRefs |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_CreateOIDCClient_Null_authContextRefs, endPoint=/v1/esignet/client-mgmt/oidc-client, role=partner, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$RANDOMID$", "clientName": "MOSIP OIDC Client", "logoUri": "https://health-services.com/logo.png", "relyingPartyId": "Bharathi-Inc", "redirectUris": "$IDPREDIRECTURI$", "publicKey": "$JWKKEY$", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{acrValues: "null"}], "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt" }, output={ "errors": [ { "errorCode": "invalid_acr" } ] }, inputTemplate=esignet/CreateOIDCClient/CreateOIDCClient, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=To create OIDC Client with null value in authContextRefs, uniqueIdentifier=TC_ESignet_CreateOIDCClient_20, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_CreateOIDCClient_Null_clientAuthMethods_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_CreateOIDCClient_Null_clientAuthMethods_Neg, endPoint=/v1/esignet/client-mgmt/oidc-client, role=partner, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$RANDOMID$", "clientName": "MOSIP OIDC Client", "logoUri": "https://health-services.com/logo.png", "relyingPartyId": "Bharathi-Inc", "redirectUris": "$IDPREDIRECTURI$", "publicKey": "$JWKKEY$", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{acrValues: "mosip:idp:acr:static-code"},{acrValues: "mosip:idp:acr:generated-code"}], "grantTypes": "authorization_code", "clientAuthMethods": "null" }, output={ "errors": [ { "errorCode": "invalid_client_auth" } ] }, inputTemplate=esignet/CreateOIDCClient/CreateOIDCClient, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=To create OIDC Client with null value in clientAuthMethods, uniqueIdentifier=TC_ESignet_CreateOIDCClient_32, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_CreateOIDCClient_Null_grantTypes_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_CreateOIDCClient_Null_grantTypes_Neg, endPoint=/v1/esignet/client-mgmt/oidc-client, role=partner, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$RANDOMID$", "clientName": "MOSIP OIDC Client", "logoUri": "https://health-services.com/logo.png", "relyingPartyId": "Bharathi-Inc", "redirectUris": "$IDPREDIRECTURI$", "publicKey": "$JWKKEY$", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{acrValues: "mosip:idp:acr:static-code"},{acrValues: "mosip:idp:acr:generated-code"}], "grantTypes": "null", "clientAuthMethods": "private_key_jwt" }, output={ "errors": [ { "errorCode": "unsupported_grant_type" } ] }, inputTemplate=esignet/CreateOIDCClient/CreateOIDCClient, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=To create OIDC Client with null value in grantTypes, uniqueIdentifier=TC_ESignet_CreateOIDCClient_26, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_CreateOIDCClient_StatusCode_Invalid_Token_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_CreateOIDCClient_StatusCode_Invalid_Token_Neg, endPoint=/v1/esignet/client-mgmt/oidc-client, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$RANDOMID$2", "clientName": "MOSIP OIDC Client", "logoUri": "https://health-services.com/logo.png", "relyingPartyId": "Bharathi-Inc", "redirectUris": "$IDPREDIRECTURI$", "publicKey": "$JWKKEY$", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{acrValues: "mosip:idp:acr:static-code"},{acrValues: "mosip:idp:acr:generated-code"}], "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt" }, output=401, inputTemplate=esignet/CreateOIDCClient/CreateOIDCClient, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=To create OIDC Client with invalid token, uniqueIdentifier=TC_ESignet_CreateOIDCClient_05, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_CreateOIDCClient_all_Valid_Smoke_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_CreateOIDCClient_all_Valid_Smoke_sid, endPoint=/v1/esignet/client-mgmt/oidc-client, role=partner, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$RANDOMID$", "clientName": "MOSIP OIDC Client", "logoUri": "https://health-services.com/logo.png", "relyingPartyId": "Bharathi-Inc", "redirectUris": "$IDPREDIRECTURI$", "publicKey": "$JWKKEY$", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{acrValues: "mosip:idp:acr:static-code"},{acrValues: "mosip:idp:acr:generated-code"},{acrValues: "mosip:idp:acr:biometrics"}], "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt" }, output={ "status": "ACTIVE" }, inputTemplate=esignet/CreateOIDCClient/CreateOIDCClient, outputTemplate=esignet/CreateOIDCClient/CreateOIDCClientResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=To create OIDC Client with all valid data, uniqueIdentifier=TC_ESignet_CreateOIDCClient_01, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_UpdateOIDCClient_StatusCode_Diff_Token_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PutWithPathParamsAndBody |
| Testcase Input |
| testCaseName=ESignet_UpdateOIDCClient_StatusCode_Diff_Token_Neg, endPoint=/v1/esignet/client-mgmt/oidc-client/{clientId}, role=idrepo, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "status": "ACTIVE", "clientName": "MOSIP OIDC Client", "logoUri": "https://health-services.com/logo.png", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "redirectUris": "$IDPREDIRECTURI$", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{acrValues: "mosip:idp:acr:static-code"},{acrValues: "mosip:idp:acr:generated-code"}], "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt" }, output=403, inputTemplate=esignet/UpdateOIDCClient/UpdateOIDCClient, outputTemplate=esignet/UpdateOIDCClient/UpdateOIDCClientResult, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=To update OIDC client with different invalid token, uniqueIdentifier=TC_ESignet_UpdateOIDCClient_07, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:210)
at io.mosip.testrig.apirig.esignet.testscripts.PutWithPathParamsAndBody.test(PutWithPathParamsAndBody.java:86)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_UpdateOIDCClient_2_all_Valid_Smoke |
| Testcase Dependency |
| [TC_ESignet_CreateOIDCClient_02] |
| Class Name |
| PutWithPathParamsAndBody |
| Testcase Input |
| testCaseName=ESignet_UpdateOIDCClient_2_all_Valid_Smoke, endPoint=/v1/esignet/client-mgmt/oidc-client/{clientId}, role=partner, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "status": "ACTIVE", "clientName": "MOSIP OIDC Client", "logoUri": "https://health-services.com/logo.png", "clientId": "$ID:CreateOIDCClient_2_Same_RelyParty_Valid_Smoke_sid_clientId$", "redirectUris": "$IDPREDIRECTURI$", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{acrValues: "mosip:idp:acr:static-code"},{acrValues: "mosip:idp:acr:generated-code"}], "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt" }, output={ "status": "ACTIVE" }, inputTemplate=esignet/UpdateOIDCClient/UpdateOIDCClient, outputTemplate=esignet/UpdateOIDCClient/UpdateOIDCClientResult, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=To update OIDC client with different valid data, uniqueIdentifier=TC_ESignet_UpdateOIDCClient_02, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_UpdateOIDCClient_Diff_RequestTime_Neg |
| Testcase Dependency |
| [TC_ESignet_CreateOIDCClient_01] |
| Class Name |
| PutWithPathParamsAndBody |
| Testcase Input |
| testCaseName=ESignet_UpdateOIDCClient_Diff_RequestTime_Neg, endPoint=/v1/esignet/client-mgmt/oidc-client/{clientId}, role=partner, templateFields=null, input={ "requestTime": "2022-11-07T06:51:30.195Z", "status": "ACTIVE", "clientName": "MOSIP OIDC Client", "logoUri": "https://health-services.com/logo.png", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "redirectUris": "$IDPREDIRECTURI$", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{acrValues: "mosip:idp:acr:static-code"},{acrValues: "mosip:idp:acr:generated-code"}], "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt" }, output={ "errors": [ { "errorCode": "invalid_request" } ] }, inputTemplate=esignet/UpdateOIDCClient/UpdateOIDCClient, outputTemplate=esignet/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=To update OIDC client with different invalid requestTime, uniqueIdentifier=TC_ESignet_UpdateOIDCClient_04, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_UpdateOIDCClient_Empty_authContextRefs_Neg |
| Testcase Dependency |
| [TC_ESignet_CreateOIDCClient_01] |
| Class Name |
| PutWithPathParamsAndBody |
| Testcase Input |
| testCaseName=ESignet_UpdateOIDCClient_Empty_authContextRefs_Neg, endPoint=/v1/esignet/client-mgmt/oidc-client/{clientId}, role=partner, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "status": "ACTIVE", "clientName": "MOSIP OIDC Client", "logoUri": "https://health-services.com/logo.png", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "redirectUris": "$IDPREDIRECTURI$", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{acrValues: ""}], "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt" }, output={ "errors": [ { "errorCode": "invalid_acr" } ] }, inputTemplate=esignet/UpdateOIDCClient/UpdateOIDCClient, outputTemplate=esignet/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=To update OIDC client with an empty authContextRefs, uniqueIdentifier=TC_ESignet_UpdateOIDCClient_17, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_UpdateOIDCClient_Empty_clientAuthMethods_Neg |
| Testcase Dependency |
| [TC_ESignet_CreateOIDCClient_01] |
| Class Name |
| PutWithPathParamsAndBody |
| Testcase Input |
| testCaseName=ESignet_UpdateOIDCClient_Empty_clientAuthMethods_Neg, endPoint=/v1/esignet/client-mgmt/oidc-client/{clientId}, role=partner, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "status": "ACTIVE", "clientName": "MOSIP OIDC Client", "logoUri": "https://health-services.com/logo.png", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "redirectUris": "$IDPREDIRECTURI$", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{acrValues: "mosip:idp:acr:static-code"},{acrValues: "mosip:idp:acr:generated-code"}], "grantTypes": "authorization_code", "clientAuthMethods": "" }, output={ "errors": [ { "errorCode": "invalid_client_auth" } ] }, inputTemplate=esignet/UpdateOIDCClient/UpdateOIDCClient, outputTemplate=esignet/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=To update OIDC client with empty clientAuthMethods, uniqueIdentifier=TC_ESignet_UpdateOIDCClient_26, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_UpdateOIDCClient_Empty_grantTypes_Neg |
| Testcase Dependency |
| [TC_ESignet_CreateOIDCClient_01] |
| Class Name |
| PutWithPathParamsAndBody |
| Testcase Input |
| testCaseName=ESignet_UpdateOIDCClient_Empty_grantTypes_Neg, endPoint=/v1/esignet/client-mgmt/oidc-client/{clientId}, role=partner, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "status": "ACTIVE", "clientName": "MOSIP OIDC Client", "logoUri": "https://health-services.com/logo.png", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "redirectUris": "$IDPREDIRECTURI$", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{acrValues: "mosip:idp:acr:static-code"},{acrValues: "mosip:idp:acr:generated-code"}], "grantTypes": "", "clientAuthMethods": "private_key_jwt" }, output={ "errors": [ { "errorCode": "unsupported_grant_type" } ] }, inputTemplate=esignet/UpdateOIDCClient/UpdateOIDCClient, outputTemplate=esignet/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=To update OIDC client with an empty grantTypes, uniqueIdentifier=TC_ESignet_UpdateOIDCClient_22, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_UpdateOIDCClient_Empty_redirectUris_Neg |
| Testcase Dependency |
| [TC_ESignet_CreateOIDCClient_01] |
| Class Name |
| PutWithPathParamsAndBody |
| Testcase Input |
| testCaseName=ESignet_UpdateOIDCClient_Empty_redirectUris_Neg, endPoint=/v1/esignet/client-mgmt/oidc-client/{clientId}, role=partner, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "status": "ACTIVE", "clientName": "MOSIP OIDC Client", "logoUri": "https://health-services.com/logo.png", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "redirectUris": "", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{acrValues: "mosip:idp:acr:static-code"},{acrValues: "mosip:idp:acr:generated-code"}], "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt" }, output={ "errors": [ { "errorCode": "invalid_redirect_uri" } ] }, inputTemplate=esignet/UpdateOIDCClient/UpdateOIDCClient, outputTemplate=esignet/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=To update OIDC client with an empty redirectUris, uniqueIdentifier=TC_ESignet_UpdateOIDCClient_13, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_UpdateOIDCClient_Exceding_Range_ClientId_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PutWithPathParamsAndBody |
| Testcase Input |
| testCaseName=ESignet_UpdateOIDCClient_Exceding_Range_ClientId_Neg, endPoint=/v1/esignet/client-mgmt/oidc-client/{clientId}, role=partner, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "status": "ACTIVE", "clientName": "MOSIP OIDC Client", "logoUri": "https://health-services.com/logo.png", "clientId": "8nr2xe4jlxa54n9okvcv1kbjjl7srfy3veqp88g2u1nn2do7za1svus4hdfj", "redirectUris": "$IDPREDIRECTURI$", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{acrValues: "mosip:idp:acr:static-code"},{acrValues: "mosip:idp:acr:generated-code"}], "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt" }, output={ "errors": [ { "errorCode": "invalid_client_id" } ] }, inputTemplate=esignet/UpdateOIDCClient/UpdateOIDCClient, outputTemplate=esignet/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=To update OIDC client with exceding range clientId, uniqueIdentifier=TC_ESignet_UpdateOIDCClient_09, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_UpdateOIDCClient_Exceding_Range_ClientName |
| Testcase Dependency |
| [TC_ESignet_CreateOIDCClient_01] |
| Class Name |
| PutWithPathParamsAndBody |
| Testcase Input |
| testCaseName=ESignet_UpdateOIDCClient_Exceding_Range_ClientName, endPoint=/v1/esignet/client-mgmt/oidc-client/{clientId}, role=partner, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "status": "ACTIVE", "clientName": "vc0neervbsu10dfbo2vu282lt0r9hf044b1q8wm957k97wpjmrmwz6kcbpv5p9zyocksfyg41u4rpm71hhqy29sqcixg1i0ed2aaxlfd9f5wtpf3py2igi3orhttvh6vqys16nmnke9qwjjr8byjflotzyw078t1azc9rvoftuhdis40mgy9uoyzoypwdbomdkjg3v9y216y7bfpiyoenhgaudirgn432u3c2x27z23zvd094m7ug4lvid8av6jhc24j", "logoUri": "https://health-services.com/logo.png", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "redirectUris": "$IDPREDIRECTURI$", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{acrValues: "mosip:idp:acr:static-code"},{acrValues: "mosip:idp:acr:generated-code"}], "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt" }, output={ "errors": [ { "errorCode": "invalid_client_name" } ] }, inputTemplate=esignet/UpdateOIDCClient/UpdateOIDCClient, outputTemplate=esignet/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=To update OIDC client with exceding range clientName, uniqueIdentifier=TC_ESignet_UpdateOIDCClient_29, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_UpdateOIDCClient_Exceding_Range_logoUri_Neg |
| Testcase Dependency |
| [TC_ESignet_CreateOIDCClient_01] |
| Class Name |
| PutWithPathParamsAndBody |
| Testcase Input |
| testCaseName=ESignet_UpdateOIDCClient_Exceding_Range_logoUri_Neg, endPoint=/v1/esignet/client-mgmt/oidc-client/{clientId}, role=partner, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "status": "ACTIVE", "clientName": "MOSIP OIDC Client", "logoUri": "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", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "redirectUris": "$IDPREDIRECTURI$", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{acrValues: "mosip:idp:acr:static-code"},{acrValues: "mosip:idp:acr:generated-code"}], "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt" }, output={ "errors": [ { "errorCode": "invalid_uri" } ] }, inputTemplate=esignet/UpdateOIDCClient/UpdateOIDCClient, outputTemplate=esignet/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=To update OIDC client with exceding range logoUri, uniqueIdentifier=TC_ESignet_UpdateOIDCClient_12, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_UpdateOIDCClient_Invalid_Range_ClientId_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PutWithPathParamsAndBody |
| Testcase Input |
| testCaseName=ESignet_UpdateOIDCClient_Invalid_Range_ClientId_Neg, endPoint=/v1/esignet/client-mgmt/oidc-client/{clientId}, role=partner, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "status": "ACTIVE", "clientName": "MOSIP OIDC Client", "logoUri": "https://health-services.com/logo.png", "clientId": " ", "redirectUris": "$IDPREDIRECTURI$", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{acrValues: "mosip:idp:acr:static-code"},{acrValues: "mosip:idp:acr:generated-code"}], "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt" }, output={ "errors": [ { "errorCode": "invalid_client_id" } ] }, inputTemplate=esignet/UpdateOIDCClient/UpdateOIDCClient, outputTemplate=esignet/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=To update OIDC client with invalid range, uniqueIdentifier=TC_ESignet_UpdateOIDCClient_08, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_UpdateOIDCClient_Invalid_Range_ClientName |
| Testcase Dependency |
| [TC_ESignet_CreateOIDCClient_01] |
| Class Name |
| PutWithPathParamsAndBody |
| Testcase Input |
| testCaseName=ESignet_UpdateOIDCClient_Invalid_Range_ClientName, endPoint=/v1/esignet/client-mgmt/oidc-client/{clientId}, role=partner, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "status": "ACTIVE", "clientName": "", "logoUri": "https://health-services.com/logo.png", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "redirectUris": "$IDPREDIRECTURI$", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{acrValues: "mosip:idp:acr:static-code"},{acrValues: "mosip:idp:acr:generated-code"}], "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt" }, output={ "errors": [ { "errorCode": "invalid_client_name" } ] }, inputTemplate=esignet/UpdateOIDCClient/UpdateOIDCClient, outputTemplate=esignet/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=To update OIDC client with all invalid range clientName, uniqueIdentifier=TC_ESignet_UpdateOIDCClient_28, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_UpdateOIDCClient_Invalid_Range_logoUri_Neg |
| Testcase Dependency |
| [TC_ESignet_CreateOIDCClient_01] |
| Class Name |
| PutWithPathParamsAndBody |
| Testcase Input |
| testCaseName=ESignet_UpdateOIDCClient_Invalid_Range_logoUri_Neg, endPoint=/v1/esignet/client-mgmt/oidc-client/{clientId}, role=partner, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "status": "ACTIVE", "clientName": "MOSIP OIDC Client", "logoUri": "", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "redirectUris": "$IDPREDIRECTURI$", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{acrValues: "mosip:idp:acr:static-code"},{acrValues: "mosip:idp:acr:generated-code"}], "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt" }, output={ "errors": [ { "errorCode": "invalid_uri" } ] }, inputTemplate=esignet/UpdateOIDCClient/UpdateOIDCClient, outputTemplate=esignet/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=To update OIDC client with invalid range logoUri, uniqueIdentifier=TC_ESignet_UpdateOIDCClient_11, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_UpdateOIDCClient_Invalid_RequestTime_Neg |
| Testcase Dependency |
| [TC_ESignet_CreateOIDCClient_01] |
| Class Name |
| PutWithPathParamsAndBody |
| Testcase Input |
| testCaseName=ESignet_UpdateOIDCClient_Invalid_RequestTime_Neg, endPoint=/v1/esignet/client-mgmt/oidc-client/{clientId}, role=partner, templateFields=null, input={ "requestTime": "2022-11-07T06:51:30", "status": "ACTIVE", "clientName": "MOSIP OIDC Client", "logoUri": "https://health-services.com/logo.png", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "redirectUris": "$IDPREDIRECTURI$", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{acrValues: "mosip:idp:acr:static-code"},{acrValues: "mosip:idp:acr:generated-code"}], "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt" }, output={ "errors": [ { "errorCode": "invalid_request" } ] }, inputTemplate=esignet/UpdateOIDCClient/UpdateOIDCClient, outputTemplate=esignet/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=To update OIDC client with invalid requestTime, uniqueIdentifier=TC_ESignet_UpdateOIDCClient_03, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_UpdateOIDCClient_Invalid_authContextRefs_Neg |
| Testcase Dependency |
| [TC_ESignet_CreateOIDCClient_01] |
| Class Name |
| PutWithPathParamsAndBody |
| Testcase Input |
| testCaseName=ESignet_UpdateOIDCClient_Invalid_authContextRefs_Neg, endPoint=/v1/esignet/client-mgmt/oidc-client/{clientId}, role=partner, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "status": "ACTIVE", "clientName": "MOSIP OIDC Client", "logoUri": "https://health-services.com/logo.png", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "redirectUris": "$IDPREDIRECTURI$", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{acrValues: "invalid_acr"}], "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt" }, output={ "errors": [ { "errorCode": "invalid_acr" } ] }, inputTemplate=esignet/UpdateOIDCClient/UpdateOIDCClient, outputTemplate=esignet/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=To update OIDC client with invalid authContextRefs, uniqueIdentifier=TC_ESignet_UpdateOIDCClient_16, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_UpdateOIDCClient_Invalid_clientAuthMethods_Neg |
| Testcase Dependency |
| [TC_ESignet_CreateOIDCClient_01] |
| Class Name |
| PutWithPathParamsAndBody |
| Testcase Input |
| testCaseName=ESignet_UpdateOIDCClient_Invalid_clientAuthMethods_Neg, endPoint=/v1/esignet/client-mgmt/oidc-client/{clientId}, role=partner, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "status": "ACTIVE", "clientName": "MOSIP OIDC Client", "logoUri": "https://health-services.com/logo.png", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "redirectUris": "$IDPREDIRECTURI$", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{acrValues: "mosip:idp:acr:static-code"},{acrValues: "mosip:idp:acr:generated-code"}], "grantTypes": "authorization_code", "clientAuthMethods": "$$#@@A" }, output={ "errors": [ { "errorCode": "invalid_client_auth" } ] }, inputTemplate=esignet/UpdateOIDCClient/UpdateOIDCClient, outputTemplate=esignet/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=To update OIDC client with invalid clientAuthMethods, uniqueIdentifier=TC_ESignet_UpdateOIDCClient_24, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_UpdateOIDCClient_Invalid_clientId_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PutWithPathParamsAndBody |
| Testcase Input |
| testCaseName=ESignet_UpdateOIDCClient_Invalid_clientId_Neg, endPoint=/v1/esignet/client-mgmt/oidc-client/{clientId}, role=partner, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "status": "ACTIVE", "clientName": "MOSIP OIDC Client", "logoUri": "https://health-services.com/logo.png", "clientId": "@#DDSS$", "redirectUris": "$IDPREDIRECTURI$", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{acrValues: "mosip:idp:acr:static-code"},{acrValues: "mosip:idp:acr:generated-code"}], "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt" }, output={ "errors": [ { "errorCode": "invalid_client_id" } ] }, inputTemplate=esignet/UpdateOIDCClient/UpdateOIDCClient, outputTemplate=esignet/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=To update OIDC client with invalid clientId, uniqueIdentifier=TC_ESignet_UpdateOIDCClient_05, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_UpdateOIDCClient_Invalid_grantTypes_Neg |
| Testcase Dependency |
| [TC_ESignet_CreateOIDCClient_01] |
| Class Name |
| PutWithPathParamsAndBody |
| Testcase Input |
| testCaseName=ESignet_UpdateOIDCClient_Invalid_grantTypes_Neg, endPoint=/v1/esignet/client-mgmt/oidc-client/{clientId}, role=partner, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "status": "ACTIVE", "clientName": "MOSIP OIDC Client", "logoUri": "https://health-services.com/logo.png", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "redirectUris": "$IDPREDIRECTURI$", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{acrValues: "mosip:idp:acr:static-code"},{acrValues: "mosip:idp:acr:generated-code"}], "grantTypes": "$$@###$", "clientAuthMethods": "private_key_jwt" }, output={ "errors": [ { "errorCode": "unsupported_grant_type" } ] }, inputTemplate=esignet/UpdateOIDCClient/UpdateOIDCClient, outputTemplate=esignet/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=To update OIDC client with invalid grantTypes, uniqueIdentifier=TC_ESignet_UpdateOIDCClient_20, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_UpdateOIDCClient_Invalid_status_Neg |
| Testcase Dependency |
| [TC_ESignet_CreateOIDCClient_01] |
| Class Name |
| PutWithPathParamsAndBody |
| Testcase Input |
| testCaseName=ESignet_UpdateOIDCClient_Invalid_status_Neg, endPoint=/v1/esignet/client-mgmt/oidc-client/{clientId}, role=partner, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "status": "@$$##%", "clientName": "MOSIP OIDC Client", "logoUri": "https://health-services.com/logo.png", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "redirectUris": "$IDPREDIRECTURI$", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{acrValues: "mosip:idp:acr:static-code"},{acrValues: "mosip:idp:acr:generated-code"}], "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt" }, output={ "errors": [ { "errorCode": "invalid_status" } ] }, inputTemplate=esignet/UpdateOIDCClient/UpdateOIDCClient, outputTemplate=esignet/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=To update OIDC client with invalid status, uniqueIdentifier=TC_ESignet_UpdateOIDCClient_10, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_UpdateOIDCClient_Invalid_userClaims_Neg |
| Testcase Dependency |
| [TC_ESignet_CreateOIDCClient_01] |
| Class Name |
| PutWithPathParamsAndBody |
| Testcase Input |
| testCaseName=ESignet_UpdateOIDCClient_Invalid_userClaims_Neg, endPoint=/v1/esignet/client-mgmt/oidc-client/{clientId}, role=partner, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "status": "ACTIVE", "clientName": "MOSIP OIDC Client", "logoUri": "https://health-services.com/logo.png", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "redirectUris": "$IDPREDIRECTURI$", "userClaims1": "xyz", "userClaims2": "fd@gh.com", "userClaims3": "$REMOVE$", "userClaims4": "$REMOVE$", "userClaims5": "$REMOVE$", "authContextRefs": [{acrValues: "mosip:idp:acr:static-code"},{acrValues: "mosip:idp:acr:generated-code"}], "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt" }, output={ "errors": [ { "errorCode": "invalid_claim" } ] }, inputTemplate=esignet/UpdateOIDCClient/UpdateOIDCClient, outputTemplate=esignet/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=To update OIDC client with invalid userClaims, uniqueIdentifier=TC_ESignet_UpdateOIDCClient_15, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_UpdateOIDCClient_Missing_authContextRefs_Neg |
| Testcase Dependency |
| [TC_ESignet_CreateOIDCClient_01] |
| Class Name |
| PutWithPathParamsAndBody |
| Testcase Input |
| testCaseName=ESignet_UpdateOIDCClient_Missing_authContextRefs_Neg, endPoint=/v1/esignet/client-mgmt/oidc-client/{clientId}, role=partner, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "status": "ACTIVE", "clientName": "MOSIP OIDC Client", "logoUri": "https://health-services.com/logo.png", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "redirectUris": "$IDPREDIRECTURI$", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{acrValues: "$REMOVE$"}], "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt" }, output={ "errors": [ { "errorCode": "invalid_acr" } ] }, inputTemplate=esignet/UpdateOIDCClient/UpdateOIDCClient, outputTemplate=esignet/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=To update OIDC client with missing authContextRefs, uniqueIdentifier=TC_ESignet_UpdateOIDCClient_19, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_UpdateOIDCClient_Missing_clientAuthMethods_Neg |
| Testcase Dependency |
| [TC_ESignet_CreateOIDCClient_01] |
| Class Name |
| PutWithPathParamsAndBody |
| Testcase Input |
| testCaseName=ESignet_UpdateOIDCClient_Missing_clientAuthMethods_Neg, endPoint=/v1/esignet/client-mgmt/oidc-client/{clientId}, role=partner, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "status": "ACTIVE", "clientName": "MOSIP OIDC Client", "logoUri": "https://health-services.com/logo.png", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "redirectUris": "$IDPREDIRECTURI$", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{acrValues: "mosip:idp:acr:static-code"},{acrValues: "mosip:idp:acr:generated-code"}], "grantTypes": "authorization_code", "clientAuthMethods": "$REMOVE$" }, output={ "errors": [ { "errorCode": "invalid_client_auth" } ] }, inputTemplate=esignet/UpdateOIDCClient/UpdateOIDCClient, outputTemplate=esignet/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=To update OIDC client with missing clientAuthMethods, uniqueIdentifier=TC_ESignet_UpdateOIDCClient_27, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_UpdateOIDCClient_Missing_grantTypes_Neg |
| Testcase Dependency |
| [TC_ESignet_CreateOIDCClient_01] |
| Class Name |
| PutWithPathParamsAndBody |
| Testcase Input |
| testCaseName=ESignet_UpdateOIDCClient_Missing_grantTypes_Neg, endPoint=/v1/esignet/client-mgmt/oidc-client/{clientId}, role=partner, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "status": "ACTIVE", "clientName": "MOSIP OIDC Client", "logoUri": "https://health-services.com/logo.png", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "redirectUris": "$IDPREDIRECTURI$", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{acrValues: "mosip:idp:acr:static-code"},{acrValues: "mosip:idp:acr:generated-code"}], "grantTypes": "$REMOVE$", "clientAuthMethods": "private_key_jwt" }, output={ "errors": [ { "errorCode": "unsupported_grant_type" } ] }, inputTemplate=esignet/UpdateOIDCClient/UpdateOIDCClient, outputTemplate=esignet/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=To update OIDC client with missing grantTypes, uniqueIdentifier=TC_ESignet_UpdateOIDCClient_23, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_UpdateOIDCClient_Missing_redirectUris_Neg |
| Testcase Dependency |
| [TC_ESignet_CreateOIDCClient_01] |
| Class Name |
| PutWithPathParamsAndBody |
| Testcase Input |
| testCaseName=ESignet_UpdateOIDCClient_Missing_redirectUris_Neg, endPoint=/v1/esignet/client-mgmt/oidc-client/{clientId}, role=partner, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "status": "ACTIVE", "clientName": "MOSIP OIDC Client", "logoUri": "https://health-services.com/logo.png", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "redirectUris": "$REMOVE$", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{acrValues: "mosip:idp:acr:static-code"},{acrValues: "mosip:idp:acr:generated-code"}], "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt" }, output={ "errors": [ { "errorCode": "invalid_redirect_uri" } ] }, inputTemplate=esignet/UpdateOIDCClient/UpdateOIDCClient, outputTemplate=esignet/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=To update OIDC client with missing redirectUris, uniqueIdentifier=TC_ESignet_UpdateOIDCClient_14, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_UpdateOIDCClient_Null_authContextRefs_Neg |
| Testcase Dependency |
| [TC_ESignet_CreateOIDCClient_01] |
| Class Name |
| PutWithPathParamsAndBody |
| Testcase Input |
| testCaseName=ESignet_UpdateOIDCClient_Null_authContextRefs_Neg, endPoint=/v1/esignet/client-mgmt/oidc-client/{clientId}, role=partner, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "status": "ACTIVE", "clientName": "MOSIP OIDC Client", "logoUri": "https://health-services.com/logo.png", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "redirectUris": "$IDPREDIRECTURI$", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{acrValues: "null"}], "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt" }, output={ "errors": [ { "errorCode": "invalid_acr" } ] }, inputTemplate=esignet/UpdateOIDCClient/UpdateOIDCClient, outputTemplate=esignet/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=To update OIDC client with null authContextRefs, uniqueIdentifier=TC_ESignet_UpdateOIDCClient_18, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_UpdateOIDCClient_Null_clientAuthMethods_Neg |
| Testcase Dependency |
| [TC_ESignet_CreateOIDCClient_01] |
| Class Name |
| PutWithPathParamsAndBody |
| Testcase Input |
| testCaseName=ESignet_UpdateOIDCClient_Null_clientAuthMethods_Neg, endPoint=/v1/esignet/client-mgmt/oidc-client/{clientId}, role=partner, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "status": "ACTIVE", "clientName": "MOSIP OIDC Client", "logoUri": "https://health-services.com/logo.png", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "redirectUris": "$IDPREDIRECTURI$", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{acrValues: "mosip:idp:acr:static-code"},{acrValues: "mosip:idp:acr:generated-code"}], "grantTypes": "authorization_code", "clientAuthMethods": "null" }, output={ "errors": [ { "errorCode": "invalid_client_auth" } ] }, inputTemplate=esignet/UpdateOIDCClient/UpdateOIDCClient, outputTemplate=esignet/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=To update OIDC client with null value in clientAuthMethods, uniqueIdentifier=TC_ESignet_UpdateOIDCClient_25, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_UpdateOIDCClient_Null_grantTypes_Neg |
| Testcase Dependency |
| [TC_ESignet_CreateOIDCClient_01] |
| Class Name |
| PutWithPathParamsAndBody |
| Testcase Input |
| testCaseName=ESignet_UpdateOIDCClient_Null_grantTypes_Neg, endPoint=/v1/esignet/client-mgmt/oidc-client/{clientId}, role=partner, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "status": "ACTIVE", "clientName": "MOSIP OIDC Client", "logoUri": "https://health-services.com/logo.png", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "redirectUris": "$IDPREDIRECTURI$", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{acrValues: "mosip:idp:acr:static-code"},{acrValues: "mosip:idp:acr:generated-code"}], "grantTypes": "null", "clientAuthMethods": "private_key_jwt" }, output={ "errors": [ { "errorCode": "unsupported_grant_type" } ] }, inputTemplate=esignet/UpdateOIDCClient/UpdateOIDCClient, outputTemplate=esignet/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=To update OIDC client with null grantTypes, uniqueIdentifier=TC_ESignet_UpdateOIDCClient_21, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_UpdateOIDCClient_StatusCode_Invalid_Token_Neg |
| Testcase Dependency |
| [TC_ESignet_CreateOIDCClient_01] |
| Class Name |
| PutWithPathParamsAndBody |
| Testcase Input |
| testCaseName=ESignet_UpdateOIDCClient_StatusCode_Invalid_Token_Neg, endPoint=/v1/esignet/client-mgmt/oidc-client/{clientId}, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "status": "ACTIVE", "clientName": "MOSIP OIDC Client", "logoUri": "https://health-services.com/logo.png", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "redirectUris": "$IDPREDIRECTURI$", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{acrValues: "mosip:idp:acr:static-code"},{acrValues: "mosip:idp:acr:generated-code"}], "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt" }, output=401, inputTemplate=esignet/UpdateOIDCClient/UpdateOIDCClient, outputTemplate=esignet/UpdateOIDCClient/UpdateOIDCClientResult, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=To update OIDC client with invalid token, uniqueIdentifier=TC_ESignet_UpdateOIDCClient_06, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_UpdateOIDCClient_all_Valid_Smoke |
| Testcase Dependency |
| [TC_ESignet_CreateOIDCClient_01] |
| Class Name |
| PutWithPathParamsAndBody |
| Testcase Input |
| testCaseName=ESignet_UpdateOIDCClient_all_Valid_Smoke, endPoint=/v1/esignet/client-mgmt/oidc-client/{clientId}, role=partner, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "status": "ACTIVE", "clientName": "MOSIP OIDC Client", "logoUri": "https://health-services.com/logo.png", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "redirectUris": "$IDPREDIRECTURI$", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{acrValues: "mosip:idp:acr:static-code"},{acrValues: "mosip:idp:acr:generated-code"},{acrValues: "mosip:idp:acr:biometrics"}], "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt" }, output={ "status": "ACTIVE" }, inputTemplate=esignet/UpdateOIDCClient/UpdateOIDCClient, outputTemplate=esignet/UpdateOIDCClient/UpdateOIDCClientResult, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=To update OIDC client with all valid data, uniqueIdentifier=TC_ESignet_UpdateOIDCClient_01, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_CreateOIDCClientV2_Invalid_clientNameLang_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_CreateOIDCClientV2_Invalid_clientNameLang_Neg, endPoint=/v1/esignet/client-mgmt/oauth-client, role=partner, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$RANDOMID$V2", "clientName": "MOSIP OIDC Client", "logoUri": "https://health-services.com/logo.png", "relyingPartyId": "Bharathi-Inc", "redirectUris": "$IDPREDIRECTURI$", "publicKey": "$JWKKEY$", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{acrValues: "mosip:idp:acr:static-code"},{acrValues: "mosip:idp:acr:generated-code"},{acrValues: "mosip:idp:acr:biometrics"}], "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt", "keyLang1": "$1STLANG$", "clientNameLang": "" }, output={ "errors": [ { "errorCode": "invalid_client_name_value" } ] }, inputTemplate=esignet/CreateOIDCClientV2/CreateOIDCClient, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=To create OIDC Client V2 with invalid clientNameLang, uniqueIdentifier=TC_ESignet_CreateOIDCClientV2_04, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_CreateOIDCClientV2_Invalid_langCode_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_CreateOIDCClientV2_Invalid_langCode_Neg, endPoint=/v1/esignet/client-mgmt/oauth-client, role=partner, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$RANDOMID$V2S2", "clientName": "MOSIP OIDC Client", "logoUri": "https://health-services.com/logo.png", "relyingPartyId": "Bharathi-Inc", "redirectUris": "$IDPREDIRECTURI$", "publicKey": "$JWKKEY$", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{acrValues: "mosip:idp:acr:static-code"},{acrValues: "mosip:idp:acr:generated-code"},{acrValues: "mosip:idp:acr:biometrics"}], "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt", "keyLang1": "abc", "clientNameLang": "MOSIP OIDC Client" }, output={ "errors": [ { "errorCode": "invalid_language_code" } ] }, inputTemplate=esignet/CreateOIDCClientV2/CreateOIDCClient, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=To create OIDC Client V2 with invalid language code, uniqueIdentifier=TC_ESignet_CreateOIDCClientV2_03, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_CreateOIDCClientV2_Invalid_langCode_Size_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_CreateOIDCClientV2_Invalid_langCode_Size_Neg, endPoint=/v1/esignet/client-mgmt/oauth-client, role=partner, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$RANDOMID$V2", "clientName": "MOSIP OIDC Client", "logoUri": "https://health-services.com/logo.png", "relyingPartyId": "Bharathi-Inc", "redirectUris": "$IDPREDIRECTURI$", "publicKey": "$JWKKEY$", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{acrValues: "mosip:idp:acr:static-code"},{acrValues: "mosip:idp:acr:generated-code"},{acrValues: "mosip:idp:acr:biometrics"}], "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt", "keyLang1": "mhsdfsfd", "clientNameLang": "MOSIP OIDC Client" }, output={ "errors": [ { "errorCode": "invalid_language_code" } ] }, inputTemplate=esignet/CreateOIDCClientV2/CreateOIDCClient, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=To create OIDC Client V2 with invalid language code size, uniqueIdentifier=TC_ESignet_CreateOIDCClientV2_02, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_CreateOIDCClientV2_Missing_ClientNamelangMap_Pos |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_CreateOIDCClientV2_Missing_ClientNamelangMap_Pos, endPoint=/v1/esignet/client-mgmt/oauth-client, role=partner, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$RANDOMPARTNERID$", "clientName": "MOSIP OIDC Client", "logoUri": "https://health-services.com/logo.png", "relyingPartyId": "Bharathi-Inc", "redirectUris": "$IDPREDIRECTURI$", "publicKey": "$JWKKEY$", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{acrValues: "mosip:idp:acr:static-code"},{acrValues: "mosip:idp:acr:generated-code"},{acrValues: "mosip:idp:acr:biometrics"}], "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt" }, output={ "status": "ACTIVE" }, inputTemplate=esignet/CreateOIDCClientV2/CreateOIDCClientWOClientLangMap, outputTemplate=esignet/CreateOIDCClientV2/CreateOIDCClientResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=To create OIDC Client V2 with missing ClientNamelangMap, uniqueIdentifier=TC_ESignet_CreateOIDCClientV2_06, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_CreateOIDCClientV2_Missing_ClientNamelangMap_Value_Pos |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_CreateOIDCClientV2_Missing_ClientNamelangMap_Value_Pos, endPoint=/v1/esignet/client-mgmt/oauth-client, role=partner, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$RANDOMPARTNERID$", "clientName": "MOSIP OIDC Client", "logoUri": "https://health-services.com/logo.png", "relyingPartyId": "Bharathi-Inc", "redirectUris": "$IDPREDIRECTURI$", "publicKey": "$JWKKEY$", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{acrValues: "mosip:idp:acr:static-code"},{acrValues: "mosip:idp:acr:generated-code"},{acrValues: "mosip:idp:acr:biometrics"}], "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt" }, output={ "status": "ACTIVE" }, inputTemplate=esignet/CreateOIDCClientV2/CreateOIDCClientWOClientLangMapValue, outputTemplate=esignet/CreateOIDCClientV2/CreateOIDCClientResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=To create OIDC Client V2 with missing clientNameLangMap value, uniqueIdentifier=TC_ESignet_CreateOIDCClientV2_05, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_CreateOIDCClientV2_all_Valid_Smoke_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_CreateOIDCClientV2_all_Valid_Smoke_sid, endPoint=/v1/esignet/client-mgmt/oauth-client, role=partner, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$RANDOMID$V2", "clientName": "MOSIP OIDC Client", "logoUri": "https://health-services.com/logo.png", "relyingPartyId": "Bharathi-Inc", "redirectUris": "$IDPREDIRECTURI$", "publicKey": "$JWKKEY$", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{acrValues: "mosip:idp:acr:static-code"},{acrValues: "mosip:idp:acr:generated-code"},{acrValues: "mosip:idp:acr:biometrics"}], "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt", "keyLang1": "$1STLANG$", "clientNameLang": "MOSIP OIDC Client" }, output={ "status": "ACTIVE" }, inputTemplate=esignet/CreateOIDCClientV2/CreateOIDCClient, outputTemplate=esignet/CreateOIDCClientV2/CreateOIDCClientResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=To create OIDC Client V2 with all valid data, uniqueIdentifier=TC_ESignet_CreateOIDCClientV2_01, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_UpdateOIDCClientV2_Invalid_clientNameLang_Neg |
| Testcase Dependency |
| [TC_ESignet_CreateOIDCClientV2_01] |
| Class Name |
| PutWithPathParamsAndBody |
| Testcase Input |
| testCaseName=ESignet_UpdateOIDCClientV2_Invalid_clientNameLang_Neg, endPoint=/v1/esignet/client-mgmt/oauth-client/{clientId}, role=partner, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "status": "ACTIVE", "clientName": "MOSIP OIDC Client", "logoUri": "https://health-services.com/logo.png", "clientId": "$ID:CreateOIDCClientV2_all_Valid_Smoke_sid_clientId$", "redirectUris": "$IDPREDIRECTURI$", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{acrValues: "mosip:idp:acr:static-code"},{acrValues: "mosip:idp:acr:generated-code"},{acrValues: "mosip:idp:acr:biometrics"}], "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt", "keyLang1": "$1STLANG$", "clientNameLang": "" }, output={ "errors": [ { "errorCode": "invalid_client_name_value" } ] }, inputTemplate=esignet/UpdateOIDCClientV2/UpdateOIDCClient, outputTemplate=esignet/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=To update OIDC Client V2 with invalid clientNameLang, uniqueIdentifier=TC_ESignet_UpdateOIDCClientV2_02, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_UpdateOIDCClientV2_Invalid_langCode_Neg |
| Testcase Dependency |
| [TC_ESignet_CreateOIDCClientV2_01] |
| Class Name |
| PutWithPathParamsAndBody |
| Testcase Input |
| testCaseName=ESignet_UpdateOIDCClientV2_Invalid_langCode_Neg, endPoint=/v1/esignet/client-mgmt/oauth-client/{clientId}, role=partner, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "status": "ACTIVE", "clientName": "MOSIP OIDC Client", "logoUri": "https://health-services.com/logo.png", "clientId": "$ID:CreateOIDCClientV2_all_Valid_Smoke_sid_clientId$", "redirectUris": "$IDPREDIRECTURI$", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{acrValues: "mosip:idp:acr:static-code"},{acrValues: "mosip:idp:acr:generated-code"},{acrValues: "mosip:idp:acr:biometrics"}], "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt", "keyLang1": "abc", "clientNameLang": "MOSIP OIDC Client" }, output={ "errors": [ { "errorCode": "invalid_language_code" } ] }, inputTemplate=esignet/UpdateOIDCClientV2/UpdateOIDCClient, outputTemplate=esignet/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=To update OIDC Client V2 with invalid language code, uniqueIdentifier=TC_ESignet_UpdateOIDCClientV2_04, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_UpdateOIDCClientV2_Invalid_langCode_Size_Neg |
| Testcase Dependency |
| [TC_ESignet_CreateOIDCClientV2_01] |
| Class Name |
| PutWithPathParamsAndBody |
| Testcase Input |
| testCaseName=ESignet_UpdateOIDCClientV2_Invalid_langCode_Size_Neg, endPoint=/v1/esignet/client-mgmt/oauth-client/{clientId}, role=partner, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "status": "ACTIVE", "clientName": "MOSIP OIDC Client", "logoUri": "https://health-services.com/logo.png", "clientId": "$ID:CreateOIDCClientV2_all_Valid_Smoke_sid_clientId$", "redirectUris": "$IDPREDIRECTURI$", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{acrValues: "mosip:idp:acr:static-code"},{acrValues: "mosip:idp:acr:generated-code"},{acrValues: "mosip:idp:acr:biometrics"}], "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt", "keyLang1": "sdfsdgsdg", "clientNameLang": "MOSIP OIDC Client" }, output={ "errors": [ { "errorCode": "invalid_language_code" } ] }, inputTemplate=esignet/UpdateOIDCClientV2/UpdateOIDCClient, outputTemplate=esignet/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=To update OIDC Client V2 with invalid language code size, uniqueIdentifier=TC_ESignet_UpdateOIDCClientV2_03, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_UpdateOIDCClientV2_Missing_ClientNamelangMap_Pos |
| Testcase Dependency |
| [TC_ESignet_CreateOIDCClientV2_01] |
| Class Name |
| PutWithPathParamsAndBody |
| Testcase Input |
| testCaseName=ESignet_UpdateOIDCClientV2_Missing_ClientNamelangMap_Pos, endPoint=/v1/esignet/client-mgmt/oauth-client/{clientId}, role=partner, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "status": "ACTIVE", "clientName": "MOSIP OIDC Client", "logoUri": "https://health-services.com/logo.png", "clientId": "$ID:CreateOIDCClientV2_all_Valid_Smoke_sid_clientId$", "redirectUris": "$IDPREDIRECTURI$", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{acrValues: "mosip:idp:acr:static-code"},{acrValues: "mosip:idp:acr:generated-code"},{acrValues: "mosip:idp:acr:biometrics"}], "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt" }, output={ "status": "ACTIVE" }, inputTemplate=esignet/UpdateOIDCClientV2/UpdateOIDCClientWOClientNameMap, outputTemplate=esignet/UpdateOIDCClient/UpdateOIDCClientResult, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=To update OIDC Client V2 with missing clientNamelangMap, uniqueIdentifier=TC_ESignet_UpdateOIDCClientV2_06, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_UpdateOIDCClientV2_Missing_ClientNamelangMap_Value_Pos |
| Testcase Dependency |
| [TC_ESignet_CreateOIDCClientV2_01] |
| Class Name |
| PutWithPathParamsAndBody |
| Testcase Input |
| testCaseName=ESignet_UpdateOIDCClientV2_Missing_ClientNamelangMap_Value_Pos, endPoint=/v1/esignet/client-mgmt/oauth-client/{clientId}, role=partner, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "status": "ACTIVE", "clientName": "MOSIP OIDC Client", "logoUri": "https://health-services.com/logo.png", "clientId": "$ID:CreateOIDCClientV2_all_Valid_Smoke_sid_clientId$", "redirectUris": "$IDPREDIRECTURI$", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{acrValues: "mosip:idp:acr:static-code"},{acrValues: "mosip:idp:acr:generated-code"},{acrValues: "mosip:idp:acr:biometrics"}], "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt" }, output={ "status": "ACTIVE" }, inputTemplate=esignet/UpdateOIDCClientV2/UpdateOIDCClientWOClientNameMapValue, outputTemplate=esignet/UpdateOIDCClient/UpdateOIDCClientResult, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=To update OIDC Client V2 with missing clientNamelangMap value, uniqueIdentifier=TC_ESignet_UpdateOIDCClientV2_05, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_UpdateOIDCClientV2_all_Valid_Smoke |
| Testcase Dependency |
| [TC_ESignet_CreateOIDCClientV2_01] |
| Class Name |
| PutWithPathParamsAndBody |
| Testcase Input |
| testCaseName=ESignet_UpdateOIDCClientV2_all_Valid_Smoke, endPoint=/v1/esignet/client-mgmt/oauth-client/{clientId}, role=partner, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "status": "ACTIVE", "clientName": "MOSIP OIDC Client", "logoUri": "https://health-services.com/logo.png", "clientId": "$ID:CreateOIDCClientV2_all_Valid_Smoke_sid_clientId$", "redirectUris": "$IDPREDIRECTURI$", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{acrValues: "mosip:idp:acr:static-code"},{acrValues: "mosip:idp:acr:generated-code"},{acrValues: "mosip:idp:acr:biometrics"}], "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt", "keyLang1": "$1STLANG$", "clientNameLang": "MOSIP OIDC Client" }, output={ "status": "ACTIVE" }, inputTemplate=esignet/UpdateOIDCClientV2/UpdateOIDCClient, outputTemplate=esignet/UpdateOIDCClient/UpdateOIDCClientResult, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=To update OIDC Client V2 with all valid data, uniqueIdentifier=TC_ESignet_UpdateOIDCClientV2_01, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_OAuthDetailsRequest_V2_uin_1stLang_all_Valid_Smoke_sid |
| Testcase Dependency |
| [TC_ESignet_CreateOIDCClientV2_01] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_OAuthDetailsRequest_V2_uin_1stLang_all_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/v2/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClientV2_all_Valid_Smoke_sid_clientId$", "scope": "mosip_identity_vc_ldp", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:generated-code mosip:idp:acr:linked-wallet mosip:idp:acr:biometrics", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "$1STLANG$", "codeChallenge": "$CODECHALLENGE$", "codeChallengeMethod": "S256" }, output={ }, inputTemplate=esignet/OAuthDetailsRequestV2/OAuthDetailsRequest, outputTemplate=esignet/OAuthDetailsRequestV2/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=To get OAuthDetails V2 with first language and all valid data, uniqueIdentifier=TC_ESignet_OAuthDetailsRequestV2_02, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_OAuthDetailsRequest_V2_uin_all_Valid_Smoke_sid |
| Testcase Dependency |
| [TC_ESignet_CreateOIDCClientV2_01] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_OAuthDetailsRequest_V2_uin_all_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/v2/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClientV2_all_Valid_Smoke_sid_clientId$", "scope": "mosip_identity_vc_ldp", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:generated-code mosip:idp:acr:linked-wallet mosip:idp:acr:biometrics", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en", "codeChallenge": "$CODECHALLENGE$", "codeChallengeMethod": "S256" }, output={ }, inputTemplate=esignet/OAuthDetailsRequestV2/OAuthDetailsRequest, outputTemplate=esignet/OAuthDetailsRequestV2/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=To get OAuthDetails V2 with all valid data, uniqueIdentifier=TC_ESignet_OAuthDetailsRequestV2_01, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_SunBirdR_CreatePolicy_NOAUTH_Valid_Smoke_Sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_SunBirdR_CreatePolicy_NOAUTH_Valid_Smoke_Sid, endPoint=$SUNBIRDBASEURL$/api/v1/Insurance, role=resident, templateFields=null, input={ "policyNumber": "$POLICYNUMBERFORSUNBIRDRC$", "policyName": "Start Insurance Gold Premium", "policyExpiresOn": "2033-04-20T20:48:17.684Z", "policyIssuedOn": "$TIMESTAMP$", "fullName" : "$FULLNAMEFORSUNBIRDRC$", "dob" : "$DOBFORSUNBIRDRC$", "benefits": [{"benefits": "Critical Surgery"}, {"benefits": "Full body checkup"}], "gender": "Male", "mobile": "0123456789", "email": "abhishek@gmail.com" }, output={ "status": "SUCCESSFUL" }, inputTemplate=esignet/SunBirdR/CreatePolicySunBirdR/CreatePolicySunBirdR, outputTemplate=esignet/SunBirdR/CreatePolicySunBirdR/CreatePolicySunBirdRResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=To create a Policy for SunBirdR with all valid data and with no authorization, uniqueIdentifier=TC_ESignet_CreatePolicySunBirdR_01, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:203)
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:93)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_SunBirdR_GetPolicy_NOAUTH_Valid_Smoke |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=ESignet_SunBirdR_GetPolicy_NOAUTH_Valid_Smoke, endPoint=$SUNBIRDBASEURL$/api/v1/Insurance/{insuranceid}, role=resident, templateFields=null, input={ "insuranceid": "$ID:SunBirdR_CreatePolicy_NOAUTH_Valid_Smoke_Sid_osid$" }, output={ }, inputTemplate=esignet/SunBirdR/GetPolicySunBirdR/GetPolicySunBirdR, outputTemplate=esignet/SunBirdR/GetPolicySunBirdR/GetPolicySunBirdRResult, restMethod=get, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=To delete policy for SunBirdR with no authorization, uniqueIdentifier=TC_ESignet_GetPolicySunBirdR_01, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:203)
at io.mosip.testrig.apirig.esignet.testscripts.GetWithParam.test(GetWithParam.java:87)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_SunBirdR_SearchPolicy_NOAUTH_Valid_Smoke |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=ESignet_SunBirdR_SearchPolicy_NOAUTH_Valid_Smoke, endPoint=$SUNBIRDBASEURL$/api/v1/Insurance/search, role=resident, templateFields=null, input={ "offset": "0", "limit": "5", "fullName": "$FULLNAMEFORSUNBIRDRC$", "dob": "$DOBFORSUNBIRDRC$", "policyNumber": "$POLICYNUMBERFORSUNBIRDRC$" }, output={ }, inputTemplate=esignet/SunBirdR/SearchPolicySunBirdR/SearchPolicySunBirdR, outputTemplate=esignet/SunBirdR/SearchPolicySunBirdR/SearchPolicySunBirdRResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=To Search for the Policy with the policynumber and with no Authorization, uniqueIdentifier=TC_ESignet_SearchPolicySunBirdR_01, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:203)
at io.mosip.testrig.apirig.esignet.testscripts.SimplePost.test(SimplePost.java:87)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_CreateOIDCClientV2SunBirdC_all_Valid_Smoke_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_CreateOIDCClientV2SunBirdC_all_Valid_Smoke_sid, endPoint=$ESIGNETMOCKBASEURL$/v1/esignet/client-mgmt/oauth-client, role=partner, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$RANDOMID$V2S3", "clientName": "MOSIP OIDC Client", "logoUri": "https://health-services.com/logo.png", "relyingPartyId": "Bharathi-Inc", "redirectUris": "$IDPREDIRECTURI$", "publicKey": "$OIDCJWKKEY4$", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{acrValues: "mosip:idp:acr:static-code"},{acrValues: "mosip:idp:acr:generated-code"},{acrValues: "mosip:idp:acr:biometrics"},{acrValues: "mosip:idp:acr:knowledge"}], "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt", "keyLang1": "$1STLANG$", "clientNameLang": "MOSIP OIDC Client" }, output={ "status": "ACTIVE" }, inputTemplate=esignet/SunBirdC/CreateOIDCClientV2SunBirdC/CreateOIDCClientV2SunBirdC, outputTemplate=esignet/SunBirdC/CreateOIDCClientV2SunBirdC/CreateOIDCClientV2SunBirdCResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=To create OIDCClientV2 for SunbirdC with all valid data, uniqueIdentifier=TC_ESignet_CreateOIDCClientV2SunBirdC_01, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: Service not deployed. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:125)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_OAuthDetailsRequest_SunBirdC_all_Valid_Smoke_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_OAuthDetailsRequest_SunBirdC_all_Valid_Smoke_sid, endPoint=$ESIGNETMOCKBASEURL$/v1/esignet/authorization/v2/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClientV2SunBirdC_all_Valid_Smoke_sid_clientId$", "scope": "$SUNBIRD_SCOPE$", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:knowledge", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en", "codeChallenge": "$CODECHALLENGE$", "codeChallengeMethod": "S256" }, output={ }, inputTemplate=esignet/SunBirdC/OAuthDetailsRequestSunBirdC/OAuthDetailsRequestSunBirdC, outputTemplate=esignet/SunBirdC/OAuthDetailsRequestSunBirdC/OAuthDetailsRequestSunBirdCResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=To Request OAuthDetails for SunBirdC with all valid data, uniqueIdentifier=TC_ESignet_OAuthDetailsRequestSunBirdC_01, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: Service not deployed. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:125)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_AuthenticateUserSunBirdC_Valid_Smoke |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=ESignet_AuthenticateUserSunBirdC_Valid_Smoke, endPoint=$ESIGNETMOCKBASEURL$/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_SunBirdC_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_SunBirdC_all_Valid_Smoke_sid_transactionId$", "individualId": "$POLICYNUMBERFORSUNBIRDRC$", "authFactorType" : "KBI", "challenge" : "$CHALLENGEVALUEFORSUNBIRDC$", "format": "base64url-encoded-json" }, output={ }, inputTemplate=esignet/SunBirdC/AuthenticateUserSunBirdC/AuthenticateUserSunBirdC, outputTemplate=esignet/SunBirdC/AuthenticateUserSunBirdC/AuthenticateUserSunBirdCResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=To Authenticate the User for SunBirdC with all valid data, uniqueIdentifier=TC_ESignet_AuthenticateUserSunBirdC_01, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: Service not deployed. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePost.test(SimplePost.java:131)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_AuthorizationCode_SunBirdC_All_Valid_Smoke_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_AuthorizationCode_SunBirdC_All_Valid_Smoke_sid, endPoint=$ESIGNETMOCKBASEURL$/v1/esignet/authorization/auth-code, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_SunBirdC_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_SunBirdC_all_Valid_Smoke_sid_transactionId$", "permittedAuthorizeScopes": [{scope: "$REMOVE$"}] }, output={ }, inputTemplate=esignet/SunBirdC/AuthorizationCodeSunBirdC/AuthorizationCodeSunBirdC, outputTemplate=esignet/SunBirdC/AuthorizationCodeSunBirdC/AuthorizationCodeSunBirdCResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=To Authorize the user for SunBirdC with all valid data, uniqueIdentifier=TC_ESignet_AuthorizationCodeSunBirdC_01, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: Service not deployed. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:125)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_GenerateTokenSunBirdC_Valid_Smoke_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenIdForUrlEncoded |
| Testcase Input |
| testCaseName=ESignet_GenerateTokenSunBirdC_Valid_Smoke_sid, endPoint=$ESIGNETMOCKBASEURL$/v1/esignet/oauth/v2/token, role=resident, templateFields=null, input={ "grant_type": "authorization_code", "code": "$ID:AuthorizationCode_SunBirdC_All_Valid_Smoke_sid_code$", "client_id": "$ID:CreateOIDCClientV2SunBirdC_all_Valid_Smoke_sid_clientId$", "client_assertion_type": "urn:ietf:params:oauth:client-assertion-type:jwt-bearer", "client_assertion": "$CLIENT_ASSERTION_USER4_JWK$", "redirect_uri": "$IDPREDIRECTURI$", "code_verifier": "$CODEVERIFIER$" }, output={ "token_type": "Bearer" }, inputTemplate=esignet/SunBirdC/GenerateTokenSunBirdC/GenerateTokenSunBirdC, outputTemplate=esignet/SunBirdC/GenerateTokenSunBirdC/GenerateTokenSunBirdCResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=To Generate token for SunBirdC with all valid data, uniqueIdentifier=TC_ESignet_GenerateTokenSunBirdC_01, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: Service not deployed. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenIdForUrlEncoded.test(SimplePostForAutoGenIdForUrlEncoded.java:109)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_OAuthDetailsRequest_SunBirdCNegTC_Scen1_AuthCode_Valid_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_OAuthDetailsRequest_SunBirdCNegTC_Scen1_AuthCode_Valid_sid, endPoint=$ESIGNETMOCKBASEURL$/v1/esignet/authorization/v2/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClientV2SunBirdC_all_Valid_Smoke_sid_clientId$", "scope": "$SUNBIRD_SCOPE$", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:knowledge", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en", "codeChallenge": "$CODECHALLENGE$", "codeChallengeMethod": "S256" }, output={ }, inputTemplate=esignet/SunBirdCNegTC/OAuthDetailsRequestSunBirdCNegTC/OAuthDetailsRequestSunBirdCNegTC, outputTemplate=esignet/SunBirdCNegTC/OAuthDetailsRequestSunBirdCNegTC/OAuthDetailsRequestSunBirdCNegTCResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=To request OAuthDetails for SunBirdC with valid AuthCode, uniqueIdentifier=TC_ESignet_OAuthDetailsRequestSunBirdCNegTC_21, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: Service not deployed. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:125)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_OAuthDetailsRequest_SunBirdCNegTC_Scen1_Valid_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_OAuthDetailsRequest_SunBirdCNegTC_Scen1_Valid_sid, endPoint=$ESIGNETMOCKBASEURL$/v1/esignet/authorization/v2/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClientV2SunBirdC_all_Valid_Smoke_sid_clientId$", "scope": "$SUNBIRD_SCOPE$", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:knowledge", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en", "codeChallenge": "$CODECHALLENGE$", "codeChallengeMethod": "S256" }, output={ }, inputTemplate=esignet/SunBirdCNegTC/OAuthDetailsRequestSunBirdCNegTC/OAuthDetailsRequestSunBirdCNegTC, outputTemplate=esignet/SunBirdCNegTC/OAuthDetailsRequestSunBirdCNegTC/OAuthDetailsRequestSunBirdCNegTCResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=To request OAuthDetails for SunBirdC with valid data, uniqueIdentifier=TC_ESignet_OAuthDetailsRequestSunBirdCNegTC_15, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: Service not deployed. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:125)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_OAuthDetailsRequest_SunBirdCNegTC_Scen2_AuthCode_Valid_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_OAuthDetailsRequest_SunBirdCNegTC_Scen2_AuthCode_Valid_sid, endPoint=$ESIGNETMOCKBASEURL$/v1/esignet/authorization/v2/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClientV2SunBirdC_all_Valid_Smoke_sid_clientId$", "scope": "$SUNBIRD_SCOPE$", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:knowledge", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en", "codeChallenge": "$CODECHALLENGE$", "codeChallengeMethod": "S256" }, output={ }, inputTemplate=esignet/SunBirdCNegTC/OAuthDetailsRequestSunBirdCNegTC/OAuthDetailsRequestSunBirdCNegTC, outputTemplate=esignet/SunBirdCNegTC/OAuthDetailsRequestSunBirdCNegTC/OAuthDetailsRequestSunBirdCNegTCResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=To request OAuthDetails for SunBirdC with different different valid AuthCode, uniqueIdentifier=TC_ESignet_OAuthDetailsRequestSunBirdCNegTC_22, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: Service not deployed. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:125)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_OAuthDetailsRequest_SunBirdCNegTC_Scen2_Valid_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_OAuthDetailsRequest_SunBirdCNegTC_Scen2_Valid_sid, endPoint=$ESIGNETMOCKBASEURL$/v1/esignet/authorization/v2/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClientV2SunBirdC_all_Valid_Smoke_sid_clientId$", "scope": "$SUNBIRD_SCOPE$", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:knowledge", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en", "codeChallenge": "$CODECHALLENGE$", "codeChallengeMethod": "S256" }, output={ }, inputTemplate=esignet/SunBirdCNegTC/OAuthDetailsRequestSunBirdCNegTC/OAuthDetailsRequestSunBirdCNegTC, outputTemplate=esignet/SunBirdCNegTC/OAuthDetailsRequestSunBirdCNegTC/OAuthDetailsRequestSunBirdCNegTCResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=To request OAuthDetails for SunBirdC with different valid data, uniqueIdentifier=TC_ESignet_OAuthDetailsRequestSunBirdCNegTC_16, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: Service not deployed. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:125)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_OAuthDetailsRequest_SunBirdCNegTC_Scen3_AuthCode_Valid_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_OAuthDetailsRequest_SunBirdCNegTC_Scen3_AuthCode_Valid_sid, endPoint=$ESIGNETMOCKBASEURL$/v1/esignet/authorization/v2/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClientV2SunBirdC_all_Valid_Smoke_sid_clientId$", "scope": "$SUNBIRD_SCOPE$", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:knowledge", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en", "codeChallenge": "$CODECHALLENGE$", "codeChallengeMethod": "S256" }, output={ }, inputTemplate=esignet/SunBirdCNegTC/OAuthDetailsRequestSunBirdCNegTC/OAuthDetailsRequestSunBirdCNegTC, outputTemplate=esignet/SunBirdCNegTC/OAuthDetailsRequestSunBirdCNegTC/OAuthDetailsRequestSunBirdCNegTCResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=To request OAuthDetails for SunBirdC with different valid AuthCode, uniqueIdentifier=TC_ESignet_OAuthDetailsRequestSunBirdCNegTC_23, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: Service not deployed. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:125)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_OAuthDetailsRequest_SunBirdCNegTC_Scen3_Valid_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_OAuthDetailsRequest_SunBirdCNegTC_Scen3_Valid_sid, endPoint=$ESIGNETMOCKBASEURL$/v1/esignet/authorization/v2/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClientV2SunBirdC_all_Valid_Smoke_sid_clientId$", "scope": "$SUNBIRD_SCOPE$", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:knowledge", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en", "codeChallenge": "$CODECHALLENGE$", "codeChallengeMethod": "S256" }, output={ }, inputTemplate=esignet/SunBirdCNegTC/OAuthDetailsRequestSunBirdCNegTC/OAuthDetailsRequestSunBirdCNegTC, outputTemplate=esignet/SunBirdCNegTC/OAuthDetailsRequestSunBirdCNegTC/OAuthDetailsRequestSunBirdCNegTCResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=To request OAuthDetails for SunBirdC with different valid data, uniqueIdentifier=TC_ESignet_OAuthDetailsRequestSunBirdCNegTC_17, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: Service not deployed. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:125)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_OAuthDetailsRequest_SunBirdCNegTC_Scen4_AuthCode_Valid_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_OAuthDetailsRequest_SunBirdCNegTC_Scen4_AuthCode_Valid_sid, endPoint=$ESIGNETMOCKBASEURL$/v1/esignet/authorization/v2/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClientV2SunBirdC_all_Valid_Smoke_sid_clientId$", "scope": "$SUNBIRD_SCOPE$", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:knowledge", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en", "codeChallenge": "$CODECHALLENGE$", "codeChallengeMethod": "S256" }, output={ }, inputTemplate=esignet/SunBirdCNegTC/OAuthDetailsRequestSunBirdCNegTC/OAuthDetailsRequestSunBirdCNegTC, outputTemplate=esignet/SunBirdCNegTC/OAuthDetailsRequestSunBirdCNegTC/OAuthDetailsRequestSunBirdCNegTCResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=To request OAuthDetails for SunBirdC with different valid Authcode, uniqueIdentifier=TC_ESignet_OAuthDetailsRequestSunBirdCNegTC_24, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: Service not deployed. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:125)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_OAuthDetailsRequest_SunBirdCNegTC_Scen4_Valid_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_OAuthDetailsRequest_SunBirdCNegTC_Scen4_Valid_sid, endPoint=$ESIGNETMOCKBASEURL$/v1/esignet/authorization/v2/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClientV2SunBirdC_all_Valid_Smoke_sid_clientId$", "scope": "$SUNBIRD_SCOPE$", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:knowledge", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en", "codeChallenge": "$CODECHALLENGE$", "codeChallengeMethod": "S256" }, output={ }, inputTemplate=esignet/SunBirdCNegTC/OAuthDetailsRequestSunBirdCNegTC/OAuthDetailsRequestSunBirdCNegTC, outputTemplate=esignet/SunBirdCNegTC/OAuthDetailsRequestSunBirdCNegTC/OAuthDetailsRequestSunBirdCNegTCResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=To request OAuthDetails for SunBirdC with different valid data, uniqueIdentifier=TC_ESignet_OAuthDetailsRequestSunBirdCNegTC_18, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: Service not deployed. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:125)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_OAuthDetailsRequest_SunBirdCNegTC_Scen5_AuthCode_Valid_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_OAuthDetailsRequest_SunBirdCNegTC_Scen5_AuthCode_Valid_sid, endPoint=$ESIGNETMOCKBASEURL$/v1/esignet/authorization/v2/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClientV2SunBirdC_all_Valid_Smoke_sid_clientId$", "scope": "$SUNBIRD_SCOPE$", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:knowledge", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en", "codeChallenge": "$CODECHALLENGE$", "codeChallengeMethod": "S256" }, output={ }, inputTemplate=esignet/SunBirdCNegTC/OAuthDetailsRequestSunBirdCNegTC/OAuthDetailsRequestSunBirdCNegTC, outputTemplate=esignet/SunBirdCNegTC/OAuthDetailsRequestSunBirdCNegTC/OAuthDetailsRequestSunBirdCNegTCResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=To request OAuthDetails for SunBirdC with different valid data, uniqueIdentifier=TC_ESignet_OAuthDetailsRequestSunBirdCNegTC_25, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: Service not deployed. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:125)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_OAuthDetailsRequest_SunBirdCNegTC_Scen5_Valid_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_OAuthDetailsRequest_SunBirdCNegTC_Scen5_Valid_sid, endPoint=$ESIGNETMOCKBASEURL$/v1/esignet/authorization/v2/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClientV2SunBirdC_all_Valid_Smoke_sid_clientId$", "scope": "$SUNBIRD_SCOPE$", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:knowledge", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en", "codeChallenge": "$CODECHALLENGE$", "codeChallengeMethod": "S256" }, output={ }, inputTemplate=esignet/SunBirdCNegTC/OAuthDetailsRequestSunBirdCNegTC/OAuthDetailsRequestSunBirdCNegTC, outputTemplate=esignet/SunBirdCNegTC/OAuthDetailsRequestSunBirdCNegTC/OAuthDetailsRequestSunBirdCNegTCResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=To request OAuthDetails for SunBirdC with different valid data, uniqueIdentifier=TC_ESignet_OAuthDetailsRequestSunBirdCNegTC_19, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: Service not deployed. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:125)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_OAuthDetailsRequest_SunBirdCNegTC_Scen6_AuthCode_Valid_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_OAuthDetailsRequest_SunBirdCNegTC_Scen6_AuthCode_Valid_sid, endPoint=$ESIGNETMOCKBASEURL$/v1/esignet/authorization/v2/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClientV2SunBirdC_all_Valid_Smoke_sid_clientId$", "scope": "$SUNBIRD_SCOPE$", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:knowledge", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en", "codeChallenge": "$CODECHALLENGE$", "codeChallengeMethod": "S256" }, output={ }, inputTemplate=esignet/SunBirdCNegTC/OAuthDetailsRequestSunBirdCNegTC/OAuthDetailsRequestSunBirdCNegTC, outputTemplate=esignet/SunBirdCNegTC/OAuthDetailsRequestSunBirdCNegTC/OAuthDetailsRequestSunBirdCNegTCResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=To request OAuthDetails for SunBirdC with different valid data, uniqueIdentifier=TC_ESignet_OAuthDetailsRequestSunBirdCNegTC_26, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: Service not deployed. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:125)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_OAuthDetailsRequest_SunBirdCNegTC_Scen6_Valid_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_OAuthDetailsRequest_SunBirdCNegTC_Scen6_Valid_sid, endPoint=$ESIGNETMOCKBASEURL$/v1/esignet/authorization/v2/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClientV2SunBirdC_all_Valid_Smoke_sid_clientId$", "scope": "$SUNBIRD_SCOPE$", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:knowledge", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en", "codeChallenge": "$CODECHALLENGE$", "codeChallengeMethod": "S256" }, output={ }, inputTemplate=esignet/SunBirdCNegTC/OAuthDetailsRequestSunBirdCNegTC/OAuthDetailsRequestSunBirdCNegTC, outputTemplate=esignet/SunBirdCNegTC/OAuthDetailsRequestSunBirdCNegTC/OAuthDetailsRequestSunBirdCNegTCResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=To request OAuthDetails for SunBirdC with different valid data, uniqueIdentifier=TC_ESignet_OAuthDetailsRequestSunBirdCNegTC_20, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: Service not deployed. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:125)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_OAuthDetailsRequest_SunBirdCNegTC_Scen7_AuthCode_Valid_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_OAuthDetailsRequest_SunBirdCNegTC_Scen7_AuthCode_Valid_sid, endPoint=$ESIGNETMOCKBASEURL$/v1/esignet/authorization/v2/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClientV2SunBirdC_all_Valid_Smoke_sid_clientId$", "scope": "$SUNBIRD_SCOPE$", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:knowledge", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en", "codeChallenge": "$CODECHALLENGE$", "codeChallengeMethod": "S256" }, output={ }, inputTemplate=esignet/SunBirdCNegTC/OAuthDetailsRequestSunBirdCNegTC/OAuthDetailsRequestSunBirdCNegTC, outputTemplate=esignet/SunBirdCNegTC/OAuthDetailsRequestSunBirdCNegTC/OAuthDetailsRequestSunBirdCNegTCResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=To request OAuthDetails for SunBirdC with different valid data, uniqueIdentifier=TC_ESignet_OAuthDetailsRequestSunBirdCNegTC_27, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: Service not deployed. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:125)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_OAuthDetailsRequest_SunBirdCNegTC_Scen8_AuthCode_Valid_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_OAuthDetailsRequest_SunBirdCNegTC_Scen8_AuthCode_Valid_sid, endPoint=$ESIGNETMOCKBASEURL$/v1/esignet/authorization/v2/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClientV2SunBirdC_all_Valid_Smoke_sid_clientId$", "scope": "$SUNBIRD_SCOPE$", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:knowledge", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en", "codeChallenge": "$CODECHALLENGE$", "codeChallengeMethod": "S256" }, output={ }, inputTemplate=esignet/SunBirdCNegTC/OAuthDetailsRequestSunBirdCNegTC/OAuthDetailsRequestSunBirdCNegTC, outputTemplate=esignet/SunBirdCNegTC/OAuthDetailsRequestSunBirdCNegTC/OAuthDetailsRequestSunBirdCNegTCResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=To request OAuthDetails for SunBirdC with different valid data, uniqueIdentifier=TC_ESignet_OAuthDetailsRequestSunBirdCNegTC_28, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: Service not deployed. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:125)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_OAuthDetailsRequest_SunBirdCNegTC_all_Valid_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_OAuthDetailsRequest_SunBirdCNegTC_all_Valid_sid, endPoint=$ESIGNETMOCKBASEURL$/v1/esignet/authorization/v2/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClientV2SunBirdC_all_Valid_Smoke_sid_clientId$", "scope": "$SUNBIRD_SCOPE$", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:knowledge", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en", "codeChallenge": "$CODECHALLENGE$", "codeChallengeMethod": "S256" }, output={ }, inputTemplate=esignet/SunBirdCNegTC/OAuthDetailsRequestSunBirdCNegTC/OAuthDetailsRequestSunBirdCNegTC, outputTemplate=esignet/SunBirdCNegTC/OAuthDetailsRequestSunBirdCNegTC/OAuthDetailsRequestSunBirdCNegTCResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=To request OAuthDetails for SunBirdC with valid data, uniqueIdentifier=TC_ESignet_OAuthDetailsRequestSunBirdCNegTC_14, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: Service not deployed. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:125)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_OAuthDetailsRequest_SunBirdC_With_only_challenge_method |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_OAuthDetailsRequest_SunBirdC_With_only_challenge_method, endPoint=$ESIGNETMOCKBASEURL$/v1/esignet/authorization/v2/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClientV2SunBirdC_all_Valid_Smoke_sid_clientId$", "scope": "$SUNBIRD_SCOPE$", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:knowledge", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en", "codeChallenge": "$REMOVE$", "codeChallengeMethod": "S256" }, output={ "errors": [ { "errorCode": "invalid_pkce_challenge" } ] }, inputTemplate=esignet/SunBirdC/OAuthDetailsRequestSunBirdC/OAuthDetailsRequestSunBirdC, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=To request OAuthDetails for SunBirdC with only challenge method, uniqueIdentifier=TC_ESignet_OAuthDetailsRequestSunBirdCNegTC_13, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: Service not deployed. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:125)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_OAuthDetailsRequest_SunBirdC_With_only_code_challenge_with_scope |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_OAuthDetailsRequest_SunBirdC_With_only_code_challenge_with_scope, endPoint=$ESIGNETMOCKBASEURL$/v1/esignet/authorization/v2/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClientV2SunBirdC_all_Valid_Smoke_sid_clientId$", "scope": "$SUNBIRD_SCOPE$", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:knowledge", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en", "codeChallenge": "$CODECHALLENGE$", "codeChallengeMethod": "$REMOVE$" }, output={ "errors": [ { "errorCode": "invalid_pkce_challenge" } ] }, inputTemplate=esignet/SunBirdC/OAuthDetailsRequestSunBirdC/OAuthDetailsRequestSunBirdC, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=To request OAuthDetails for SunBirdC with only codeChallenge with scope, uniqueIdentifier=TC_ESignet_OAuthDetailsRequestSunBirdCNegTC_12, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: Service not deployed. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:125)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_OAuthDetailsRequest_SunBirdC_all_Valid_with_other_acrs |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_OAuthDetailsRequest_SunBirdC_all_Valid_with_other_acrs, endPoint=$ESIGNETMOCKBASEURL$/v1/esignet/authorization/v2/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClientV2SunBirdC_all_Valid_Smoke_sid_clientId$", "scope": "$SUNBIRD_SCOPE$", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:knowledge mosip:idp:acr:generated-code mosip:idp:acr:linked-wallet mosip:idp:acr:biometrics", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en", "codeChallenge": "$CODECHALLENGE$", "codeChallengeMethod": "S256" }, output={ }, inputTemplate=esignet/SunBirdC/OAuthDetailsRequestSunBirdC/OAuthDetailsRequestSunBirdC, outputTemplate=esignet/SunBirdC/OAuthDetailsRequestSunBirdC/OAuthDetailsRequestSunBirdCResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=To request OAuthDetails for SunBirdC with all valid dataand with other acrs, uniqueIdentifier=TC_ESignet_OAuthDetailsRequestSunBirdCNegTC_01, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: Service not deployed. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:125)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_OAuthDetailsRequest_SunBirdC_with_empty_challenege_data |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_OAuthDetailsRequest_SunBirdC_with_empty_challenege_data, endPoint=$ESIGNETMOCKBASEURL$/v1/esignet/authorization/v2/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClientV2SunBirdC_all_Valid_Smoke_sid_clientId$", "scope": "$SUNBIRD_SCOPE$", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:knowledge", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en", "codeChallenge": " ", "codeChallengeMethod": " " }, output={ "errors": [ { "erroCode": "unsupported_pkce_challenge_method" } ] }, inputTemplate=esignet/SunBirdC/OAuthDetailsRequestSunBirdC/OAuthDetailsRequestSunBirdC, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=unsupported_pkce_challenge_method,invalid_pkce_challenge, kycFields=null, description=To request OAuthDetails for SunBirdC with an empty codeChallenge data, uniqueIdentifier=TC_ESignet_OAuthDetailsRequestSunBirdCNegTC_09, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: Service not deployed. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:125)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_OAuthDetailsRequest_SunBirdC_with_invalid_challenege_method |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_OAuthDetailsRequest_SunBirdC_with_invalid_challenege_method, endPoint=$ESIGNETMOCKBASEURL$/v1/esignet/authorization/v2/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClientV2SunBirdC_all_Valid_Smoke_sid_clientId$", "scope": "$SUNBIRD_SCOPE$", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:knowledge", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en", "codeChallenge": "$CODECHALLENGE$", "codeChallengeMethod": "@64gdbbjn" }, output={ "errors": [ { "errorCode": "unsupported_pkce_challenge_method" } ] }, inputTemplate=esignet/SunBirdC/OAuthDetailsRequestSunBirdC/OAuthDetailsRequestSunBirdC, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=To request OAuthDetails for SunBirdC with invalid codeChallengeMethod, uniqueIdentifier=TC_ESignet_OAuthDetailsRequestSunBirdCNegTC_08, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: Service not deployed. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:125)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_OAuthDetailsRequest_SunBirdC_with_invalid_scope_data |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_OAuthDetailsRequest_SunBirdC_with_invalid_scope_data, endPoint=$ESIGNETMOCKBASEURL$/v1/esignet/authorization/v2/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClientV2SunBirdC_all_Valid_Smoke_sid_clientId$", "scope": "anbcsh123", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:knowledge", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en", "codeChallenge": "$CODECHALLENGE$", "codeChallengeMethod": "S256" }, output={ "errors": [ { "errorCode": "invalid_scope" } ] }, inputTemplate=esignet/SunBirdC/OAuthDetailsRequestSunBirdC/OAuthDetailsRequestSunBirdC, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=To request OAuthDetails for SunBirdC with invalid scope value, uniqueIdentifier=TC_ESignet_OAuthDetailsRequestSunBirdCNegTC_04, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: Service not deployed. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:125)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_OAuthDetailsRequest_SunBirdC_with_lengthy_codeChallenege_data |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_OAuthDetailsRequest_SunBirdC_with_lengthy_codeChallenege_data, endPoint=$ESIGNETMOCKBASEURL$/v1/esignet/authorization/v2/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClientV2SunBirdC_all_Valid_Smoke_sid_clientId$", "scope": "$SUNBIRD_SCOPE$", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:knowledge", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en", "codeChallenge": "9sJ3SSa1AfcYwqieyegdbdbdbdbhey373664gfgfbcbcbcncjccudhdyye7eyeggcbc374hfgdfdsbs98645g4gvgvv", "codeChallengeMethod": "S256" }, output={ }, inputTemplate=esignet/SunBirdC/OAuthDetailsRequestSunBirdC/OAuthDetailsRequestSunBirdC, outputTemplate=esignet/SunBirdC/OAuthDetailsRequestSunBirdC/OAuthDetailsRequestSunBirdCResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=To request OAuthDetails for SunBirdC with lenghty codeChallenge data, uniqueIdentifier=TC_ESignet_OAuthDetailsRequestSunBirdCNegTC_10, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: Service not deployed. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:125)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_OAuthDetailsRequest_SunBirdC_with_opeind_scope_data |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_OAuthDetailsRequest_SunBirdC_with_opeind_scope_data, endPoint=$ESIGNETMOCKBASEURL$/v1/esignet/authorization/v2/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClientV2SunBirdC_all_Valid_Smoke_sid_clientId$", "scope": "openid profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:knowledge", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en", "codeChallenge": "$CODECHALLENGE$", "codeChallengeMethod": "S256" }, output={ }, inputTemplate=esignet/SunBirdC/OAuthDetailsRequestSunBirdC/OAuthDetailsRequestSunBirdC, outputTemplate=esignet/SunBirdC/OAuthDetailsRequestSunBirdC/OAuthDetailsRequestSunBirdCResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=To request OAuthDetails for SunBirdC with openid scope data, uniqueIdentifier=TC_ESignet_OAuthDetailsRequestSunBirdCNegTC_05, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: Service not deployed. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:125)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_OAuthDetailsRequest_SunBirdC_with_openid_profile_sunbird_data_Pos |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_OAuthDetailsRequest_SunBirdC_with_openid_profile_sunbird_data_Pos, endPoint=$ESIGNETMOCKBASEURL$/v1/esignet/authorization/v2/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClientV2SunBirdC_all_Valid_Smoke_sid_clientId$", "scope": "openid profile sunbird_rc_insurance_vc_ldp", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:knowledge", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en", "codeChallenge": "$CODECHALLENGE$", "codeChallengeMethod": "S256" }, output={ }, inputTemplate=esignet/SunBirdC/OAuthDetailsRequestSunBirdC/OAuthDetailsRequestSunBirdC, outputTemplate=esignet/SunBirdC/OAuthDetailsRequestSunBirdC/OAuthDetailsRequestSunBirdCResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=To request OAuthDetails for SunBirdC with openid profile sunbird value in scope, uniqueIdentifier=TC_ESignet_OAuthDetailsRequestSunBirdCNegTC_06, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: Service not deployed. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:125)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_OAuthDetailsRequest_SunBirdC_with_random_codeChallenege_data |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_OAuthDetailsRequest_SunBirdC_with_random_codeChallenege_data, endPoint=$ESIGNETMOCKBASEURL$/v1/esignet/authorization/v2/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClientV2SunBirdC_all_Valid_Smoke_sid_clientId$", "scope": "$SUNBIRD_SCOPE$", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:knowledge", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en", "codeChallenge": "9sJ3SSa1AfcYwqi", "codeChallengeMethod": "S256" }, output={ }, inputTemplate=esignet/SunBirdC/OAuthDetailsRequestSunBirdC/OAuthDetailsRequestSunBirdC, outputTemplate=esignet/SunBirdC/OAuthDetailsRequestSunBirdC/OAuthDetailsRequestSunBirdCResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=To request OAuthDetails for SunBirdC with random codeChallenge data, uniqueIdentifier=TC_ESignet_OAuthDetailsRequestSunBirdCNegTC_07, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: Service not deployed. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:125)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_OAuthDetailsRequest_SunBirdC_without_codeChallenege_and_with_sunbirdc_scope |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_OAuthDetailsRequest_SunBirdC_without_codeChallenege_and_with_sunbirdc_scope, endPoint=$ESIGNETMOCKBASEURL$/v1/esignet/authorization/v2/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClientV2SunBirdC_all_Valid_Smoke_sid_clientId$", "scope": "$SUNBIRD_SCOPE$", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:knowledge", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en", "codeChallenge": "$REMOVE$", "codeChallengeMethod": "S256" }, output={ "errors": [ { "errorCode": "invalid_pkce_challenge" } ] }, inputTemplate=esignet/SunBirdC/OAuthDetailsRequestSunBirdC/OAuthDetailsRequestSunBirdC, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=To request OAuthDetails for SunBirdC with sunbirdc scope, uniqueIdentifier=TC_ESignet_OAuthDetailsRequestSunBirdCNegTC_11, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: Service not deployed. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:125)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_OAuthDetailsRequest_SunBirdC_without_scope |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_OAuthDetailsRequest_SunBirdC_without_scope, endPoint=$ESIGNETMOCKBASEURL$/v1/esignet/authorization/v2/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClientV2SunBirdC_all_Valid_Smoke_sid_clientId$", "scope": "$REMOVE$", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:knowledge", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en", "codeChallenge": "$CODECHALLENGE$", "codeChallengeMethod": "S256" }, output={ "errors": [ { "errorCode": "invalid_scope" } ] }, inputTemplate=esignet/SunBirdC/OAuthDetailsRequestSunBirdC/OAuthDetailsRequestSunBirdC, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=To request OAuthDetails for SunBirdC with all valid data and without scope, uniqueIdentifier=TC_ESignet_OAuthDetailsRequestSunBirdCNegTC_02, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: Service not deployed. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:125)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_OAuthDetailsRequest_SunBirdC_without_scope_data |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_OAuthDetailsRequest_SunBirdC_without_scope_data, endPoint=$ESIGNETMOCKBASEURL$/v1/esignet/authorization/v2/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClientV2SunBirdC_all_Valid_Smoke_sid_clientId$", "scope": "", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:knowledge", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en", "codeChallenge": "$CODECHALLENGE$", "codeChallengeMethod": "S256" }, output={ "errors": [ { "errorCode": "invalid_scope" } ] }, inputTemplate=esignet/SunBirdC/OAuthDetailsRequestSunBirdC/OAuthDetailsRequestSunBirdC, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=To request OAuthDetails for SunBirdC with all valid data and without scope data, uniqueIdentifier=TC_ESignet_OAuthDetailsRequestSunBirdCNegTC_03, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: Service not deployed. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:125)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_AuthenticateUserSunBirdCNegTC_Diff_Format1_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=ESignet_AuthenticateUserSunBirdCNegTC_Diff_Format1_Neg, endPoint=$ESIGNETMOCKBASEURL$/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_SunBirdCNegTC_Scen3_Valid_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_SunBirdCNegTC_Scen3_Valid_sid_transactionId$", "individualId": "$POLICYNUMBERFORSUNBIRDRC$", "authFactorType" : "KBI", "challenge" : "$CHALLENGEVALUEFORSUNBIRDC$", "format": "alpha-numeric" }, output={ "errors": [ { "errorCode": "invalid_challenge_format" } ] }, inputTemplate=esignet/SunBirdCNegTC/AuthenticateUserSunBirdCNegTC/AuthenticateUserSunBirdCNegTC, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=To Authenticate the user for SunBirdC with different invalid formats, uniqueIdentifier=TC_ESignet_AuthenticateUserSunBirdCNegTC_30, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: Service not deployed. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePost.test(SimplePost.java:131)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_AuthenticateUserSunBirdCNegTC_Diff_Format2_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=ESignet_AuthenticateUserSunBirdCNegTC_Diff_Format2_Neg, endPoint=$ESIGNETMOCKBASEURL$/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_SunBirdCNegTC_Scen4_Valid_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_SunBirdCNegTC_Scen4_Valid_sid_transactionId$", "individualId": "$POLICYNUMBERFORSUNBIRDRC$", "authFactorType" : "KBI", "challenge" : "$CHALLENGEVALUEFORSUNBIRDC$", "format": "encoded-json" }, output={ "errors": [ { "errorCode": "invalid_challenge_format" } ] }, inputTemplate=esignet/SunBirdCNegTC/AuthenticateUserSunBirdCNegTC/AuthenticateUserSunBirdCNegTC, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=To Authenticate the user for SunBirdC with different invalid formats, uniqueIdentifier=TC_ESignet_AuthenticateUserSunBirdCNegTC_31, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: Service not deployed. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePost.test(SimplePost.java:131)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_AuthenticateUserSunBirdCNegTC_Diff_Format3_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=ESignet_AuthenticateUserSunBirdCNegTC_Diff_Format3_Neg, endPoint=$ESIGNETMOCKBASEURL$/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_SunBirdCNegTC_Scen5_Valid_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_SunBirdCNegTC_Scen5_Valid_sid_transactionId$", "individualId": "$POLICYNUMBERFORSUNBIRDRC$", "authFactorType" : "KBI", "challenge" : "$CHALLENGEVALUEFORSUNBIRDC$", "format": "number" }, output={ "errors": [ { "errorCode": "invalid_challenge_format" } ] }, inputTemplate=esignet/SunBirdCNegTC/AuthenticateUserSunBirdCNegTC/AuthenticateUserSunBirdCNegTC, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=To Authenticate the user for SunBirdC with different invalid formats, uniqueIdentifier=TC_ESignet_AuthenticateUserSunBirdCNegTC_32, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: Service not deployed. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePost.test(SimplePost.java:131)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_AuthenticateUserSunBirdCNegTC_Diff_Format4_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=ESignet_AuthenticateUserSunBirdCNegTC_Diff_Format4_Neg, endPoint=$ESIGNETMOCKBASEURL$/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_SunBirdCNegTC_Scen6_Valid_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_SunBirdCNegTC_Scen6_Valid_sid_transactionId$", "individualId": "$POLICYNUMBERFORSUNBIRDRC$", "authFactorType" : "KBI", "challenge" : "$CHALLENGEVALUEFORSUNBIRDC$", "format": "jwt" }, output={ "errors": [ { "errorCode": "invalid_challenge_format" } ] }, inputTemplate=esignet/SunBirdCNegTC/AuthenticateUserSunBirdCNegTC/AuthenticateUserSunBirdCNegTC, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=To Authenticate the user for SunBirdC with different invalid formats, uniqueIdentifier=TC_ESignet_AuthenticateUserSunBirdCNegTC_33, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: Service not deployed. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePost.test(SimplePost.java:131)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_AuthenticateUserSunBirdCNegTC_Empty_AuthFactorType_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=ESignet_AuthenticateUserSunBirdCNegTC_Empty_AuthFactorType_Neg, endPoint=$ESIGNETMOCKBASEURL$/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_SunBirdCNegTC_all_Valid_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_SunBirdCNegTC_all_Valid_sid_transactionId$", "individualId": "$POLICYNUMBERFORSUNBIRDRC$", "authFactorType" : "", "challenge" : "$CHALLENGEVALUEFORSUNBIRDC$", "format": "base64url-encoded-json" }, output={ "errors": [ { "errorCode": "invalid_auth_factor_type" } ] }, inputTemplate=esignet/SunBirdCNegTC/AuthenticateUserSunBirdCNegTC/AuthenticateUserSunBirdCNegTC, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=invalid_auth_factor_type, kycFields=null, description=To Authenticate the user for SunBirdC with an empty authFactorType, uniqueIdentifier=TC_ESignet_AuthenticateUserSunBirdCNegTC_11, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: Service not deployed. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePost.test(SimplePost.java:131)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_AuthenticateUserSunBirdCNegTC_Empty_Challenge_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=ESignet_AuthenticateUserSunBirdCNegTC_Empty_Challenge_Neg, endPoint=$ESIGNETMOCKBASEURL$/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_SunBirdCNegTC_all_Valid_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_SunBirdCNegTC_all_Valid_sid_transactionId$", "individualId": "$POLICYNUMBERFORSUNBIRDRC$", "authFactorType" : "KBI", "challenge" : "", "format": "base64url-encoded-json" }, output={ "errors": [ { "errorCode": "invalid_challenge" } ] }, inputTemplate=esignet/SunBirdCNegTC/AuthenticateUserSunBirdCNegTC/AuthenticateUserSunBirdCNegTC, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=invalid_challenge, kycFields=null, description=To Authenticate the user for SunBirdC with an empty challenge, uniqueIdentifier=TC_ESignet_AuthenticateUserSunBirdCNegTC_17, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: Service not deployed. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePost.test(SimplePost.java:131)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_AuthenticateUserSunBirdCNegTC_Empty_Format_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=ESignet_AuthenticateUserSunBirdCNegTC_Empty_Format_Neg, endPoint=$ESIGNETMOCKBASEURL$/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_SunBirdCNegTC_all_Valid_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_SunBirdCNegTC_all_Valid_sid_transactionId$", "individualId": "$POLICYNUMBERFORSUNBIRDRC$", "authFactorType" : "KBI", "challenge" : "$CHALLENGEVALUEFORSUNBIRDC$", "format": "" }, output={ "errors": [ { "errorCode": "invalid_challenge_format" } ] }, inputTemplate=esignet/SunBirdCNegTC/AuthenticateUserSunBirdCNegTC/AuthenticateUserSunBirdCNegTC, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=invalid_challenge_format, kycFields=null, description=To Authenticate the user for SunBirdC with an empty challenge, uniqueIdentifier=TC_ESignet_AuthenticateUserSunBirdCNegTC_24, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: Service not deployed. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePost.test(SimplePost.java:131)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_AuthenticateUserSunBirdCNegTC_Empty_PolicyNum_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=ESignet_AuthenticateUserSunBirdCNegTC_Empty_PolicyNum_Neg, endPoint=$ESIGNETMOCKBASEURL$/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_SunBirdCNegTC_all_Valid_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_SunBirdCNegTC_all_Valid_sid_transactionId$", "individualId": "", "authFactorType" : "KBI", "challenge" : "$CHALLENGEVALUEFORSUNBIRDC$", "format": "base64url-encoded-json" }, output={ "errors": [ { "errorCode": "invalid_identifier" } ] }, inputTemplate=esignet/SunBirdCNegTC/AuthenticateUserSunBirdCNegTC/AuthenticateUserSunBirdCNegTC, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=To Authenticate the user for SunBirdC with an empty policy number, uniqueIdentifier=TC_ESignet_AuthenticateUserSunBirdCNegTC_06, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: Service not deployed. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePost.test(SimplePost.java:131)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_AuthenticateUserSunBirdCNegTC_Empty_TransactionID_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=ESignet_AuthenticateUserSunBirdCNegTC_Empty_TransactionID_Neg, endPoint=$ESIGNETMOCKBASEURL$/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_SunBirdCNegTC_all_Valid_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "sgsfdg", "individualId": "$POLICYNUMBERFORSUNBIRDRC$", "authFactorType" : "KBI", "challenge" : "$CHALLENGEVALUEFORSUNBIRDC$", "format": "base64url-encoded-json" }, output={ "errors": [ { "errorCode": "invalid_transaction" } ] }, inputTemplate=esignet/SunBirdCNegTC/AuthenticateUserSunBirdCNegTC/AuthenticateUserSunBirdCNegTC, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=To Authenticate the user for SunBirdC with an empty transactionId, uniqueIdentifier=TC_ESignet_AuthenticateUserSunBirdCNegTC_03, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: Service not deployed. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePost.test(SimplePost.java:131)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_AuthenticateUserSunBirdCNegTC_Expired_TransactionID_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=ESignet_AuthenticateUserSunBirdCNegTC_Expired_TransactionID_Neg, endPoint=$ESIGNETMOCKBASEURL$/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_SunBirdCNegTC_all_Valid_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "LIqWka8p3F4ID2Z2X4Dnxqf57ixUZyHxGGrDe7R96p4", "individualId": "$POLICYNUMBERFORSUNBIRDRC$", "authFactorType" : "KBI", "challenge" : "$CHALLENGEVALUEFORSUNBIRDC$", "format": "base64url-encoded-json" }, output={ "errors": [ { "errorCode": "invalid_transaction" } ] }, inputTemplate=esignet/SunBirdCNegTC/AuthenticateUserSunBirdCNegTC/AuthenticateUserSunBirdCNegTC, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=To Authenticate the user for SunBirdC with an expired transactionId, uniqueIdentifier=TC_ESignet_AuthenticateUserSunBirdCNegTC_04, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: Service not deployed. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePost.test(SimplePost.java:131)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_AuthenticateUserSunBirdCNegTC_Invalid_AuthFactorType_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=ESignet_AuthenticateUserSunBirdCNegTC_Invalid_AuthFactorType_Neg, endPoint=$ESIGNETMOCKBASEURL$/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_SunBirdCNegTC_all_Valid_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_SunBirdCNegTC_all_Valid_sid_transactionId$", "individualId": "$POLICYNUMBERFORSUNBIRDRC$", "authFactorType" : "ads", "challenge" : "$CHALLENGEVALUEFORSUNBIRDC$", "format": "base64url-encoded-json" }, output={ "errors": [ { "errorCode": "invalid_auth_factor_type" } ] }, inputTemplate=esignet/SunBirdCNegTC/AuthenticateUserSunBirdCNegTC/AuthenticateUserSunBirdCNegTC, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=invalid_challenge_length,, kycFields=null, description=To Authenticate the user for SunBirdC with invalid authFactorType, uniqueIdentifier=TC_ESignet_AuthenticateUserSunBirdCNegTC_10, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: Service not deployed. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePost.test(SimplePost.java:131)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_AuthenticateUserSunBirdCNegTC_Invalid_Challenge_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=ESignet_AuthenticateUserSunBirdCNegTC_Invalid_Challenge_Neg, endPoint=$ESIGNETMOCKBASEURL$/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_SunBirdCNegTC_all_Valid_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_SunBirdCNegTC_all_Valid_sid_transactionId$", "individualId": "$POLICYNUMBERFORSUNBIRDRC$", "authFactorType" : "KBI", "challenge" : "eyJmdWxsTmFtZSI6IkthaWYgZGFmZHNmZCIsImRvYiI6IjIwMDAtMDctMjYifQ==", "format": "base64url-encoded-json" }, output={ "errors": [ { "errorCode": "auth_failed" } ] }, inputTemplate=esignet/SunBirdCNegTC/AuthenticateUserSunBirdCNegTC/AuthenticateUserSunBirdCNegTC, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=To Authenticate the user for SunBirdC with an invalid challenge, uniqueIdentifier=TC_ESignet_AuthenticateUserSunBirdCNegTC_18, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: Service not deployed. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePost.test(SimplePost.java:131)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_AuthenticateUserSunBirdCNegTC_Invalid_Encoded_Challenge_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=ESignet_AuthenticateUserSunBirdCNegTC_Invalid_Encoded_Challenge_Neg, endPoint=$ESIGNETMOCKBASEURL$/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_SunBirdCNegTC_all_Valid_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_SunBirdCNegTC_all_Valid_sid_transactionId$", "individualId": "$POLICYNUMBERFORSUNBIRDRC$", "authFactorType" : "KBI", "challenge" : "eyJmdWxsTmFtZSI6IkthaWYgZGFmZHNmZCIsImRvYiI6IjIwMDAtMDctMjYifQ==", "format": "base64url-encoded-json" }, output={ "errors": [ { "errorCode": "auth_failed" } ] }, inputTemplate=esignet/SunBirdCNegTC/AuthenticateUserSunBirdCNegTC/AuthenticateUserSunBirdCNegTC, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=To Authenticate the user for SunBirdC with invalid encoded challenge, uniqueIdentifier=TC_ESignet_AuthenticateUserSunBirdCNegTC_19, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: Service not deployed. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePost.test(SimplePost.java:131)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_AuthenticateUserSunBirdCNegTC_Invalid_Format_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=ESignet_AuthenticateUserSunBirdCNegTC_Invalid_Format_Neg, endPoint=$ESIGNETMOCKBASEURL$/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_SunBirdCNegTC_Scen2_Valid_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_SunBirdCNegTC_Scen2_Valid_sid_transactionId$", "individualId": "$POLICYNUMBERFORSUNBIRDRC$", "authFactorType" : "KBI", "challenge" : "$CHALLENGEVALUEFORSUNBIRDC$", "format": "sdfgffgs" }, output={ "errors": [ { "errorCode": "invalid_challenge_format" } ] }, inputTemplate=esignet/SunBirdCNegTC/AuthenticateUserSunBirdCNegTC/AuthenticateUserSunBirdCNegTC, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=To Authenticate the user for SunBirdC with invalid format, uniqueIdentifier=TC_ESignet_AuthenticateUserSunBirdCNegTC_29, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: Service not deployed. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePost.test(SimplePost.java:131)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_AuthenticateUserSunBirdCNegTC_Invalid_PolicyNum_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=ESignet_AuthenticateUserSunBirdCNegTC_Invalid_PolicyNum_Neg, endPoint=$ESIGNETMOCKBASEURL$/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_SunBirdCNegTC_all_Valid_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_SunBirdCNegTC_all_Valid_sid_transactionId$", "individualId": "5adsf1", "authFactorType" : "KBI", "challenge" : "$CHALLENGEVALUEFORSUNBIRDC$", "format": "base64url-encoded-json" }, output={ "errors": [ { "errorCode": "auth_failed" } ] }, inputTemplate=esignet/SunBirdCNegTC/AuthenticateUserSunBirdCNegTC/AuthenticateUserSunBirdCNegTC, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=To Authenticate the user for SunBirdC with invalid policy number, uniqueIdentifier=TC_ESignet_AuthenticateUserSunBirdCNegTC_05, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: Service not deployed. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePost.test(SimplePost.java:131)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_AuthenticateUserSunBirdCNegTC_Invalid_TransactionID_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=ESignet_AuthenticateUserSunBirdCNegTC_Invalid_TransactionID_Neg, endPoint=$ESIGNETMOCKBASEURL$/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_SunBirdCNegTC_all_Valid_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "sgsfdg", "individualId": "$POLICYNUMBERFORSUNBIRDRC$", "authFactorType" : "KBI", "challenge" : "$CHALLENGEVALUEFORSUNBIRDC$", "format": "base64url-encoded-json" }, output={ "errors": [ { "errorCode": "invalid_transaction" } ] }, inputTemplate=esignet/SunBirdCNegTC/AuthenticateUserSunBirdCNegTC/AuthenticateUserSunBirdCNegTC, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=To Authenticate the user for SunBirdC with invalid transactionId, uniqueIdentifier=TC_ESignet_AuthenticateUserSunBirdCNegTC_01, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: Service not deployed. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePost.test(SimplePost.java:131)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_AuthenticateUserSunBirdCNegTC_Missing_AuthFactorType_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=ESignet_AuthenticateUserSunBirdCNegTC_Missing_AuthFactorType_Neg, endPoint=$ESIGNETMOCKBASEURL$/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_SunBirdCNegTC_all_Valid_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_SunBirdCNegTC_all_Valid_sid_transactionId$", "individualId": "$POLICYNUMBERFORSUNBIRDRC$", "authFactorType" : "$REMOVE$", "challenge" : "$CHALLENGEVALUEFORSUNBIRDC$", "format": "base64url-encoded-json" }, output={ "errors": [ { "errorCode": "invalid_auth_factor_type" } ] }, inputTemplate=esignet/SunBirdCNegTC/AuthenticateUserSunBirdCNegTC/AuthenticateUserSunBirdCNegTC, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=invalid_auth_factor_type, kycFields=null, description=To Authenticate the user for SunBirdC with missing authFactorType, uniqueIdentifier=TC_ESignet_AuthenticateUserSunBirdCNegTC_15, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: Service not deployed. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePost.test(SimplePost.java:131)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_AuthenticateUserSunBirdCNegTC_Missing_Challenge_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=ESignet_AuthenticateUserSunBirdCNegTC_Missing_Challenge_Neg, endPoint=$ESIGNETMOCKBASEURL$/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_SunBirdCNegTC_all_Valid_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_SunBirdCNegTC_all_Valid_sid_transactionId$", "individualId": "$POLICYNUMBERFORSUNBIRDRC$", "authFactorType" : "KBI", "challenge" : "$REMOVE$", "format": "base64url-encoded-json" }, output={ "errors": [ { "errorCode": "invalid_challenge" } ] }, inputTemplate=esignet/SunBirdCNegTC/AuthenticateUserSunBirdCNegTC/AuthenticateUserSunBirdCNegTC, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=invalid_challenge, kycFields=null, description=To Authenticate the user for SunBirdC with missing challenge, uniqueIdentifier=TC_ESignet_AuthenticateUserSunBirdCNegTC_16, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: Service not deployed. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePost.test(SimplePost.java:131)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_AuthenticateUserSunBirdCNegTC_Missing_Format_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=ESignet_AuthenticateUserSunBirdCNegTC_Missing_Format_Neg, endPoint=$ESIGNETMOCKBASEURL$/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_SunBirdCNegTC_all_Valid_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_SunBirdCNegTC_all_Valid_sid_transactionId$", "individualId": "$POLICYNUMBERFORSUNBIRDRC$", "authFactorType" : "KBI", "challenge" : "$CHALLENGEVALUEFORSUNBIRDC$", "format": "$REMOVE$" }, output={ "errors": [ { "errorCode": "invalid_challenge_format" } ] }, inputTemplate=esignet/SunBirdCNegTC/AuthenticateUserSunBirdCNegTC/AuthenticateUserSunBirdCNegTC, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=invalid_challenge_format, kycFields=null, description=To Authenticate the user for SunBirdC with an missing challenge, uniqueIdentifier=TC_ESignet_AuthenticateUserSunBirdCNegTC_23, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: Service not deployed. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePost.test(SimplePost.java:131)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_AuthenticateUserSunBirdCNegTC_Missing_PolicyNum_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=ESignet_AuthenticateUserSunBirdCNegTC_Missing_PolicyNum_Neg, endPoint=$ESIGNETMOCKBASEURL$/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_SunBirdCNegTC_all_Valid_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_SunBirdCNegTC_all_Valid_sid_transactionId$", "individualId": "$REMOVE$", "authFactorType" : "KBI", "challenge" : "$CHALLENGEVALUEFORSUNBIRDC$", "format": "base64url-encoded-json" }, output={ "errors": [ { "errorCode": "invalid_identifier" } ] }, inputTemplate=esignet/SunBirdCNegTC/AuthenticateUserSunBirdCNegTC/AuthenticateUserSunBirdCNegTC, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=To Authenticate the user for SunBirdC with missing policy number, uniqueIdentifier=TC_ESignet_AuthenticateUserSunBirdCNegTC_09, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: Service not deployed. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePost.test(SimplePost.java:131)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_AuthenticateUserSunBirdCNegTC_Missing_TransactionID_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=ESignet_AuthenticateUserSunBirdCNegTC_Missing_TransactionID_Neg, endPoint=$ESIGNETMOCKBASEURL$/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_SunBirdCNegTC_all_Valid_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$REMOVE$", "individualId": "$POLICYNUMBERFORSUNBIRDRC$", "authFactorType" : "KBI", "challenge" : "$CHALLENGEVALUEFORSUNBIRDC$", "format": "base64url-encoded-json" }, output={ "errors": [ { "errorCode": "invalid_transaction" } ] }, inputTemplate=esignet/SunBirdCNegTC/AuthenticateUserSunBirdCNegTC/AuthenticateUserSunBirdCNegTC, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=To Authenticate the user for SunBirdC with missing transactionId, uniqueIdentifier=TC_ESignet_AuthenticateUserSunBirdCNegTC_02, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: Service not deployed. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePost.test(SimplePost.java:131)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_AuthenticateUserSunBirdCNegTC_Null_AuthFactorType_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=ESignet_AuthenticateUserSunBirdCNegTC_Null_AuthFactorType_Neg, endPoint=$ESIGNETMOCKBASEURL$/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_SunBirdCNegTC_all_Valid_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_SunBirdCNegTC_all_Valid_sid_transactionId$", "individualId": "$POLICYNUMBERFORSUNBIRDRC$", "authFactorType" : "null", "challenge" : "$CHALLENGEVALUEFORSUNBIRDC$", "format": "base64url-encoded-json" }, output={ "errors": [ { "errorCode": "invalid_auth_factor_type" } ] }, inputTemplate=esignet/SunBirdCNegTC/AuthenticateUserSunBirdCNegTC/AuthenticateUserSunBirdCNegTC, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=invalid_challenge_length, kycFields=null, description=To Authenticate the user for SunBirdC with null value in authFactorType, uniqueIdentifier=TC_ESignet_AuthenticateUserSunBirdCNegTC_13, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: Service not deployed. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePost.test(SimplePost.java:131)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_AuthenticateUserSunBirdCNegTC_Null_Challenge_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=ESignet_AuthenticateUserSunBirdCNegTC_Null_Challenge_Neg, endPoint=$ESIGNETMOCKBASEURL$/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_SunBirdCNegTC_all_Valid_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_SunBirdCNegTC_all_Valid_sid_transactionId$", "individualId": "$POLICYNUMBERFORSUNBIRDRC$", "authFactorType" : "KBI", "challenge" : "null", "format": "base64url-encoded-json" }, output={ "errors": [ { "errorCode": "invalid_challenge" } ] }, inputTemplate=esignet/SunBirdCNegTC/AuthenticateUserSunBirdCNegTC/AuthenticateUserSunBirdCNegTC, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=To Authenticate the user for SunBirdC with null value in challenge, uniqueIdentifier=TC_ESignet_AuthenticateUserSunBirdCNegTC_21, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: Service not deployed. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePost.test(SimplePost.java:131)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_AuthenticateUserSunBirdCNegTC_Null_Format_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=ESignet_AuthenticateUserSunBirdCNegTC_Null_Format_Neg, endPoint=$ESIGNETMOCKBASEURL$/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_SunBirdCNegTC_Scen1_Valid_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_SunBirdCNegTC_Scen1_Valid_sid_transactionId$", "individualId": "$POLICYNUMBERFORSUNBIRDRC$", "authFactorType" : "KBI", "challenge" : "$CHALLENGEVALUEFORSUNBIRDC$", "format": "null" }, output={ "errors": [ { "errorCode": "invalid_challenge_format" } ] }, inputTemplate=esignet/SunBirdCNegTC/AuthenticateUserSunBirdCNegTC/AuthenticateUserSunBirdCNegTC, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=To Authenticate the user for SunBirdC with null value in format, uniqueIdentifier=TC_ESignet_AuthenticateUserSunBirdCNegTC_28, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: Service not deployed. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePost.test(SimplePost.java:131)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_AuthenticateUserSunBirdCNegTC_Null_PolicyNum_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=ESignet_AuthenticateUserSunBirdCNegTC_Null_PolicyNum_Neg, endPoint=$ESIGNETMOCKBASEURL$/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_SunBirdCNegTC_all_Valid_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_SunBirdCNegTC_all_Valid_sid_transactionId$", "individualId": "null", "authFactorType" : "KBI", "challenge" : "$CHALLENGEVALUEFORSUNBIRDC$", "format": "base64url-encoded-json" }, output={ "errors": [ { "errorCode": "auth_failed" } ] }, inputTemplate=esignet/SunBirdCNegTC/AuthenticateUserSunBirdCNegTC/AuthenticateUserSunBirdCNegTC, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=To Authenticate the user for SunBirdC with null value in policy number, uniqueIdentifier=TC_ESignet_AuthenticateUserSunBirdCNegTC_08, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: Service not deployed. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePost.test(SimplePost.java:131)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_AuthenticateUserSunBirdCNegTC_Other_AuthFactorType_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=ESignet_AuthenticateUserSunBirdCNegTC_Other_AuthFactorType_Neg, endPoint=$ESIGNETMOCKBASEURL$/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_SunBirdCNegTC_all_Valid_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_SunBirdCNegTC_all_Valid_sid_transactionId$", "individualId": "$POLICYNUMBERFORSUNBIRDRC$", "authFactorType" : "OTP", "challenge" : "$CHALLENGEVALUEFORSUNBIRDC$", "format": "base64url-encoded-json" }, output={ "errors": [ { "errorCode": "invalid_challenge_format" } ] }, inputTemplate=esignet/SunBirdCNegTC/AuthenticateUserSunBirdCNegTC/AuthenticateUserSunBirdCNegTC, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=invalid_challenge_length, kycFields=null, description=To Authenticate the user for SunBirdC with other authFactorType, uniqueIdentifier=TC_ESignet_AuthenticateUserSunBirdCNegTC_14, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: Service not deployed. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePost.test(SimplePost.java:131)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_AuthenticateUserSunBirdCNegTC_Random_Challenge_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=ESignet_AuthenticateUserSunBirdCNegTC_Random_Challenge_Neg, endPoint=$ESIGNETMOCKBASEURL$/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_SunBirdCNegTC_all_Valid_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_SunBirdCNegTC_all_Valid_sid_transactionId$", "individualId": "$POLICYNUMBERFORSUNBIRDRC$", "authFactorType" : "KBI", "challenge" : "sfdgsfhsgjrtjysngfbfsnbsgfjhsgj", "format": "base64url-encoded-json" }, output={ "errors": [ { "errorCode": "invalid_challenge" } ] }, inputTemplate=esignet/SunBirdCNegTC/AuthenticateUserSunBirdCNegTC/AuthenticateUserSunBirdCNegTC, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=To Authenticate the user for SunBirdC with random challenge, uniqueIdentifier=TC_ESignet_AuthenticateUserSunBirdCNegTC_22, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: Service not deployed. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePost.test(SimplePost.java:131)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_AuthenticateUserSunBirdCNegTC_Scen1_AuthCode_Valid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=ESignet_AuthenticateUserSunBirdCNegTC_Scen1_AuthCode_Valid, endPoint=$ESIGNETMOCKBASEURL$/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_SunBirdCNegTC_Scen1_AuthCode_Valid_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_SunBirdCNegTC_Scen1_AuthCode_Valid_sid_transactionId$", "individualId": "$POLICYNUMBERFORSUNBIRDRC$", "authFactorType" : "KBI", "challenge" : "$CHALLENGEVALUEFORSUNBIRDC$", "format": "base64url-encoded-json" }, output={ }, inputTemplate=esignet/SunBirdCNegTC/AuthenticateUserSunBirdCNegTC/AuthenticateUserSunBirdCNegTC, outputTemplate=esignet/SunBirdCNegTC/AuthenticateUserSunBirdCNegTC/AuthenticateUserSunBirdCNegTCResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=To Authenticate the user for SunBirdC with invalid authcode, uniqueIdentifier=TC_ESignet_AuthenticateUserSunBirdCNegTC_34, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: Service not deployed. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePost.test(SimplePost.java:131)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_AuthenticateUserSunBirdCNegTC_Scen2_AuthCode_Valid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=ESignet_AuthenticateUserSunBirdCNegTC_Scen2_AuthCode_Valid, endPoint=$ESIGNETMOCKBASEURL$/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_SunBirdCNegTC_Scen2_AuthCode_Valid_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_SunBirdCNegTC_Scen2_AuthCode_Valid_sid_transactionId$", "individualId": "$POLICYNUMBERFORSUNBIRDRC$", "authFactorType" : "KBI", "challenge" : "$CHALLENGEVALUEFORSUNBIRDC$", "format": "base64url-encoded-json" }, output={ }, inputTemplate=esignet/SunBirdCNegTC/AuthenticateUserSunBirdCNegTC/AuthenticateUserSunBirdCNegTC, outputTemplate=esignet/SunBirdCNegTC/AuthenticateUserSunBirdCNegTC/AuthenticateUserSunBirdCNegTCResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=To Authenticate the user for SunBirdC with different invalid authcode, uniqueIdentifier=TC_ESignet_AuthenticateUserSunBirdCNegTC_35, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: Service not deployed. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePost.test(SimplePost.java:131)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_AuthenticateUserSunBirdCNegTC_Scen3_AuthCode_Valid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=ESignet_AuthenticateUserSunBirdCNegTC_Scen3_AuthCode_Valid, endPoint=$ESIGNETMOCKBASEURL$/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_SunBirdCNegTC_Scen3_AuthCode_Valid_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_SunBirdCNegTC_Scen3_AuthCode_Valid_sid_transactionId$", "individualId": "$POLICYNUMBERFORSUNBIRDRC$", "authFactorType" : "KBI", "challenge" : "$CHALLENGEVALUEFORSUNBIRDC$", "format": "base64url-encoded-json" }, output={ }, inputTemplate=esignet/SunBirdCNegTC/AuthenticateUserSunBirdCNegTC/AuthenticateUserSunBirdCNegTC, outputTemplate=esignet/SunBirdCNegTC/AuthenticateUserSunBirdCNegTC/AuthenticateUserSunBirdCNegTCResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=To Authenticate the user for SunBirdC with different invalid authcode, uniqueIdentifier=TC_ESignet_AuthenticateUserSunBirdCNegTC_36, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: Service not deployed. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePost.test(SimplePost.java:131)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_AuthenticateUserSunBirdCNegTC_Scen4_AuthCode_Valid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=ESignet_AuthenticateUserSunBirdCNegTC_Scen4_AuthCode_Valid, endPoint=$ESIGNETMOCKBASEURL$/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_SunBirdCNegTC_Scen4_AuthCode_Valid_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_SunBirdCNegTC_Scen4_AuthCode_Valid_sid_transactionId$", "individualId": "$POLICYNUMBERFORSUNBIRDRC$", "authFactorType" : "KBI", "challenge" : "$CHALLENGEVALUEFORSUNBIRDC$", "format": "base64url-encoded-json" }, output={ }, inputTemplate=esignet/SunBirdCNegTC/AuthenticateUserSunBirdCNegTC/AuthenticateUserSunBirdCNegTC, outputTemplate=esignet/SunBirdCNegTC/AuthenticateUserSunBirdCNegTC/AuthenticateUserSunBirdCNegTCResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=To Authenticate the user for SunBirdC with different invalid authcode, uniqueIdentifier=TC_ESignet_AuthenticateUserSunBirdCNegTC_37, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: Service not deployed. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePost.test(SimplePost.java:131)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_AuthenticateUserSunBirdCNegTC_Scen5_AuthCode_Valid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=ESignet_AuthenticateUserSunBirdCNegTC_Scen5_AuthCode_Valid, endPoint=$ESIGNETMOCKBASEURL$/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_SunBirdCNegTC_Scen5_AuthCode_Valid_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_SunBirdCNegTC_Scen5_AuthCode_Valid_sid_transactionId$", "individualId": "$POLICYNUMBERFORSUNBIRDRC$", "authFactorType" : "KBI", "challenge" : "$CHALLENGEVALUEFORSUNBIRDC$", "format": "base64url-encoded-json" }, output={ }, inputTemplate=esignet/SunBirdCNegTC/AuthenticateUserSunBirdCNegTC/AuthenticateUserSunBirdCNegTC, outputTemplate=esignet/SunBirdCNegTC/AuthenticateUserSunBirdCNegTC/AuthenticateUserSunBirdCNegTCResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=To Authenticate the user for SunBirdC with different invalid authcode, uniqueIdentifier=TC_ESignet_AuthenticateUserSunBirdCNegTC_38, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: Service not deployed. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePost.test(SimplePost.java:131)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_AuthenticateUserSunBirdCNegTC_Scen6_AuthCode_Valid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=ESignet_AuthenticateUserSunBirdCNegTC_Scen6_AuthCode_Valid, endPoint=$ESIGNETMOCKBASEURL$/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_SunBirdCNegTC_Scen6_AuthCode_Valid_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_SunBirdCNegTC_Scen6_AuthCode_Valid_sid_transactionId$", "individualId": "$POLICYNUMBERFORSUNBIRDRC$", "authFactorType" : "KBI", "challenge" : "$CHALLENGEVALUEFORSUNBIRDC$", "format": "base64url-encoded-json" }, output={ }, inputTemplate=esignet/SunBirdCNegTC/AuthenticateUserSunBirdCNegTC/AuthenticateUserSunBirdCNegTC, outputTemplate=esignet/SunBirdCNegTC/AuthenticateUserSunBirdCNegTC/AuthenticateUserSunBirdCNegTCResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=To Authenticate the user for SunBirdC with different invalid authcode, uniqueIdentifier=TC_ESignet_AuthenticateUserSunBirdCNegTC_39, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: Service not deployed. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePost.test(SimplePost.java:131)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_AuthenticateUserSunBirdCNegTC_Scen7_AuthCode_Valid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=ESignet_AuthenticateUserSunBirdCNegTC_Scen7_AuthCode_Valid, endPoint=$ESIGNETMOCKBASEURL$/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_SunBirdCNegTC_Scen7_AuthCode_Valid_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_SunBirdCNegTC_Scen7_AuthCode_Valid_sid_transactionId$", "individualId": "$POLICYNUMBERFORSUNBIRDRC$", "authFactorType" : "KBI", "challenge" : "$CHALLENGEVALUEFORSUNBIRDC$", "format": "base64url-encoded-json" }, output={ }, inputTemplate=esignet/SunBirdCNegTC/AuthenticateUserSunBirdCNegTC/AuthenticateUserSunBirdCNegTC, outputTemplate=esignet/SunBirdCNegTC/AuthenticateUserSunBirdCNegTC/AuthenticateUserSunBirdCNegTCResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=To Authenticate the user for SunBirdC with different invalid authcode, uniqueIdentifier=TC_ESignet_AuthenticateUserSunBirdCNegTC_40, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: Service not deployed. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePost.test(SimplePost.java:131)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_AuthenticateUserSunBirdCNegTC_Scen8_AuthCode_Valid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=ESignet_AuthenticateUserSunBirdCNegTC_Scen8_AuthCode_Valid, endPoint=$ESIGNETMOCKBASEURL$/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_SunBirdCNegTC_Scen8_AuthCode_Valid_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_SunBirdCNegTC_Scen8_AuthCode_Valid_sid_transactionId$", "individualId": "$POLICYNUMBERFORSUNBIRDRC$", "authFactorType" : "KBI", "challenge" : "$CHALLENGEVALUEFORSUNBIRDC$", "format": "base64url-encoded-json" }, output={ }, inputTemplate=esignet/SunBirdCNegTC/AuthenticateUserSunBirdCNegTC/AuthenticateUserSunBirdCNegTC, outputTemplate=esignet/SunBirdCNegTC/AuthenticateUserSunBirdCNegTC/AuthenticateUserSunBirdCNegTCResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=To Authenticate the user for SunBirdC with different invalid authcode, uniqueIdentifier=TC_ESignet_AuthenticateUserSunBirdCNegTC_41, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: Service not deployed. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePost.test(SimplePost.java:131)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_AuthenticateUserSunBirdCNegTC_SpaceVal_AuthFactorType_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=ESignet_AuthenticateUserSunBirdCNegTC_SpaceVal_AuthFactorType_Neg, endPoint=$ESIGNETMOCKBASEURL$/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_SunBirdCNegTC_all_Valid_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_SunBirdCNegTC_all_Valid_sid_transactionId$", "individualId": "$POLICYNUMBERFORSUNBIRDRC$", "authFactorType" : " ", "challenge" : "$CHALLENGEVALUEFORSUNBIRDC$", "format": "base64url-encoded-json" }, output={ "errors": [ { "errorCode": "invalid_auth_factor_type" } ] }, inputTemplate=esignet/SunBirdCNegTC/AuthenticateUserSunBirdCNegTC/AuthenticateUserSunBirdCNegTC, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=invalid_auth_factor_type, kycFields=null, description=To Authenticate the user for SunBirdC with space value in authFactorType, uniqueIdentifier=TC_ESignet_AuthenticateUserSunBirdCNegTC_12, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: Service not deployed. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePost.test(SimplePost.java:131)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_AuthenticateUserSunBirdCNegTC_SpaceVal_Challenge_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=ESignet_AuthenticateUserSunBirdCNegTC_SpaceVal_Challenge_Neg, endPoint=$ESIGNETMOCKBASEURL$/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_SunBirdCNegTC_all_Valid_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_SunBirdCNegTC_all_Valid_sid_transactionId$", "individualId": "$POLICYNUMBERFORSUNBIRDRC$", "authFactorType" : "KBI", "challenge" : " ", "format": "base64url-encoded-json" }, output={ "errors": [ { "errorCode": "invalid_challenge" } ] }, inputTemplate=esignet/SunBirdCNegTC/AuthenticateUserSunBirdCNegTC/AuthenticateUserSunBirdCNegTC, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=invalid_challenge, kycFields=null, description=To Authenticate the user for SunBirdC with space value in challenge, uniqueIdentifier=TC_ESignet_AuthenticateUserSunBirdCNegTC_20, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: Service not deployed. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePost.test(SimplePost.java:131)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_AuthenticateUserSunBirdCNegTC_SpaceVal_Format_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=ESignet_AuthenticateUserSunBirdCNegTC_SpaceVal_Format_Neg, endPoint=$ESIGNETMOCKBASEURL$/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_SunBirdCNegTC_all_Valid_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_SunBirdCNegTC_all_Valid_sid_transactionId$", "individualId": "$POLICYNUMBERFORSUNBIRDRC$", "authFactorType" : "KBI", "challenge" : "$CHALLENGEVALUEFORSUNBIRDC$", "format": " " }, output={ "errors": [ { "errorCode": "invalid_challenge_format" } ] }, inputTemplate=esignet/SunBirdCNegTC/AuthenticateUserSunBirdCNegTC/AuthenticateUserSunBirdCNegTC, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=invalid_challenge_format, kycFields=null, description=To Authenticate the user for SunBirdC with space value in format, uniqueIdentifier=TC_ESignet_AuthenticateUserSunBirdCNegTC_25, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: Service not deployed. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePost.test(SimplePost.java:131)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_AuthenticateUserSunBirdCNegTC_SpaceVal_PolicyNum_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=ESignet_AuthenticateUserSunBirdCNegTC_SpaceVal_PolicyNum_Neg, endPoint=$ESIGNETMOCKBASEURL$/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_SunBirdCNegTC_all_Valid_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_SunBirdCNegTC_all_Valid_sid_transactionId$", "individualId": " ", "authFactorType" : "KBI", "challenge" : "$CHALLENGEVALUEFORSUNBIRDC$", "format": "base64url-encoded-json" }, output={ "errors": [ { "errorCode": "invalid_identifier" } ] }, inputTemplate=esignet/SunBirdCNegTC/AuthenticateUserSunBirdCNegTC/AuthenticateUserSunBirdCNegTC, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=To Authenticate the user for SunBirdC with space value in policy number, uniqueIdentifier=TC_ESignet_AuthenticateUserSunBirdCNegTC_07, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: Service not deployed. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePost.test(SimplePost.java:131)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_AuthenticateUserSunBirdCNegTC_Used_TransactionID_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=ESignet_AuthenticateUserSunBirdCNegTC_Used_TransactionID_Neg, endPoint=$ESIGNETMOCKBASEURL$/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_SunBirdCNegTC_all_Valid_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_SunBirdCNegTC_all_Valid_sid_transactionId$", "individualId": "$POLICYNUMBERFORSUNBIRDRC$", "authFactorType" : "KBI", "challenge" : "$CHALLENGEVALUEFORSUNBIRDC$", "format": "base64url-encoded-json" }, output={ "errors": [ { "errorCode": "invalid_transaction" } ] }, inputTemplate=esignet/SunBirdCNegTC/AuthenticateUserSunBirdCNegTC/AuthenticateUserSunBirdCNegTC, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=To Authenticate the user for SunBirdC with already used transactionId, uniqueIdentifier=TC_ESignet_AuthenticateUserSunBirdCNegTC_27, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: Service not deployed. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePost.test(SimplePost.java:131)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_AuthenticateUserSunBirdCNegTC_Valid_Pos |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=ESignet_AuthenticateUserSunBirdCNegTC_Valid_Pos, endPoint=$ESIGNETMOCKBASEURL$/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_SunBirdCNegTC_all_Valid_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_SunBirdCNegTC_all_Valid_sid_transactionId$", "individualId": "$POLICYNUMBERFORSUNBIRDRC$", "authFactorType" : "KBI", "challenge" : "$CHALLENGEVALUEFORSUNBIRDC$", "format": "base64url-encoded-json" }, output={ }, inputTemplate=esignet/SunBirdCNegTC/AuthenticateUserSunBirdCNegTC/AuthenticateUserSunBirdCNegTC, outputTemplate=esignet/SunBirdCNegTC/AuthenticateUserSunBirdCNegTC/AuthenticateUserSunBirdCNegTCResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=To Authenticate the user for SunBirdC with invalid data, uniqueIdentifier=TC_ESignet_AuthenticateUserSunBirdCNegTC_26, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: Service not deployed. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePost.test(SimplePost.java:131)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_AuthorizationCode_SunBirdCNegTC_All_Valid_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_AuthorizationCode_SunBirdCNegTC_All_Valid_sid, endPoint=$ESIGNETMOCKBASEURL$/v1/esignet/authorization/auth-code, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_SunBirdCNegTC_all_Valid_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_SunBirdCNegTC_all_Valid_sid_transactionId$", "permittedAuthorizeScopes": [{scope: "$SUNBIRD_SCOPE$"}] }, output={ }, inputTemplate=esignet/SunBirdCNegTC/AuthorizationCodeSunBirdCNegTC/AuthorizationCodeSunBirdCNegTC, outputTemplate=esignet/SunBirdCNegTC/AuthorizationCodeSunBirdCNegTC/AuthorizationCodeSunBirdCNegTCResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=To Authenticate the user for SunBirdC with all valid data, uniqueIdentifier=TC_ESignet_AuthorizationCodeSunBirdCNegTC_09, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: Service not deployed. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:125)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_AuthorizationCode_SunBirdCNegTC_Comma_Separated_Scope_Pos |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_AuthorizationCode_SunBirdCNegTC_Comma_Separated_Scope_Pos, endPoint=$ESIGNETMOCKBASEURL$/v1/esignet/authorization/auth-code, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_SunBirdCNegTC_Scen3_AuthCode_Valid_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_SunBirdCNegTC_Scen3_AuthCode_Valid_sid_transactionId$", "permittedAuthorizeScopes": [{scope: "sunbird_rc_insurance_vc_ldp,openid profile"}] }, output={ }, inputTemplate=esignet/SunBirdCNegTC/AuthorizationCodeSunBirdCNegTC/AuthorizationCodeSunBirdCNegTC, outputTemplate=esignet/SunBirdCNegTC/AuthorizationCodeSunBirdCNegTC/AuthorizationCodeSunBirdCNegTCResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=To Authenticate the user for SunBirdC with comma separated scope, uniqueIdentifier=TC_ESignet_AuthorizationCodeSunBirdCNegTC_03, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: Service not deployed. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:125)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_AuthorizationCode_SunBirdCNegTC_Diff_Scope2_Pos |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_AuthorizationCode_SunBirdCNegTC_Diff_Scope2_Pos, endPoint=$ESIGNETMOCKBASEURL$/v1/esignet/authorization/auth-code, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_SunBirdCNegTC_Scen2_AuthCode_Valid_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_SunBirdCNegTC_Scen2_AuthCode_Valid_sid_transactionId$", "permittedAuthorizeScopes": [{scope: "openid profile"}, {scope: "$SUNBIRD_SCOPE$"}] }, output={ }, inputTemplate=esignet/SunBirdCNegTC/AuthorizationCodeSunBirdCNegTC/AuthorizationCodeSunBirdCNegTC, outputTemplate=esignet/SunBirdCNegTC/AuthorizationCodeSunBirdCNegTC/AuthorizationCodeSunBirdCNegTCResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=To Authenticate the user for SunBirdC with multiple different scope, uniqueIdentifier=TC_ESignet_AuthorizationCodeSunBirdCNegTC_02, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: Service not deployed. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:125)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_AuthorizationCode_SunBirdCNegTC_Diff_Scope_Pos |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_AuthorizationCode_SunBirdCNegTC_Diff_Scope_Pos, endPoint=$ESIGNETMOCKBASEURL$/v1/esignet/authorization/auth-code, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_SunBirdCNegTC_Scen1_AuthCode_Valid_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_SunBirdCNegTC_Scen1_AuthCode_Valid_sid_transactionId$", "permittedAuthorizeScopes": [{scope: "openid profile"}] }, output={ }, inputTemplate=esignet/SunBirdCNegTC/AuthorizationCodeSunBirdCNegTC/AuthorizationCodeSunBirdCNegTC, outputTemplate=esignet/SunBirdCNegTC/AuthorizationCodeSunBirdCNegTC/AuthorizationCodeSunBirdCNegTCResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=To Authenticate the user for SunBirdC with different scope, uniqueIdentifier=TC_ESignet_AuthorizationCodeSunBirdCNegTC_01, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: Service not deployed. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:125)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_AuthorizationCode_SunBirdCNegTC_Empty_Scope_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_AuthorizationCode_SunBirdCNegTC_Empty_Scope_Neg, endPoint=$ESIGNETMOCKBASEURL$/v1/esignet/authorization/auth-code, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_SunBirdCNegTC_Scen5_AuthCode_Valid_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_SunBirdCNegTC_Scen5_AuthCode_Valid_sid_transactionId$", "permittedAuthorizeScopes": [{scope: ""}] }, output={ "errors": [ { "errorCode": "invalid_permitted_scope" } ] }, inputTemplate=esignet/SunBirdCNegTC/AuthorizationCodeSunBirdCNegTC/AuthorizationCodeSunBirdCNegTC, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=To Authenticate the user for SunBirdC with an empty scope, uniqueIdentifier=TC_ESignet_AuthorizationCodeSunBirdCNegTC_05, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: Service not deployed. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:125)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_AuthorizationCode_SunBirdCNegTC_Invalid_Scope_Pos |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_AuthorizationCode_SunBirdCNegTC_Invalid_Scope_Pos, endPoint=$ESIGNETMOCKBASEURL$/v1/esignet/authorization/auth-code, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_SunBirdCNegTC_Scen7_AuthCode_Valid_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_SunBirdCNegTC_Scen7_AuthCode_Valid_sid_transactionId$", "permittedAuthorizeScopes": [{scope: "sgsdfhg"}] }, output={ }, inputTemplate=esignet/SunBirdCNegTC/AuthorizationCodeSunBirdCNegTC/AuthorizationCodeSunBirdCNegTC, outputTemplate=esignet/SunBirdCNegTC/AuthorizationCodeSunBirdCNegTC/AuthorizationCodeSunBirdCNegTCResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=To Authenticate the user for SunBirdC with invalid scope, uniqueIdentifier=TC_ESignet_AuthorizationCodeSunBirdCNegTC_07, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: Service not deployed. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:125)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_AuthorizationCode_SunBirdCNegTC_Missing_Scope_Pos |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_AuthorizationCode_SunBirdCNegTC_Missing_Scope_Pos, endPoint=$ESIGNETMOCKBASEURL$/v1/esignet/authorization/auth-code, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_SunBirdCNegTC_Scen4_AuthCode_Valid_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_SunBirdCNegTC_Scen4_AuthCode_Valid_sid_transactionId$", "permittedAuthorizeScopes": [{scope: "$REMOVE$"}] }, output={ }, inputTemplate=esignet/SunBirdCNegTC/AuthorizationCodeSunBirdCNegTC/AuthorizationCodeSunBirdCNegTC, outputTemplate=esignet/SunBirdCNegTC/AuthorizationCodeSunBirdCNegTC/AuthorizationCodeSunBirdCNegTCResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=To Authenticate the user for SunBirdC with missing scope, uniqueIdentifier=TC_ESignet_AuthorizationCodeSunBirdCNegTC_04, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: Service not deployed. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:125)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_AuthorizationCode_SunBirdCNegTC_Null_Scope_Pos |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_AuthorizationCode_SunBirdCNegTC_Null_Scope_Pos, endPoint=$ESIGNETMOCKBASEURL$/v1/esignet/authorization/auth-code, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_SunBirdCNegTC_Scen8_AuthCode_Valid_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_SunBirdCNegTC_Scen8_AuthCode_Valid_sid_transactionId$", "permittedAuthorizeScopes": [{scope: "null"}] }, output={ }, inputTemplate=esignet/SunBirdCNegTC/AuthorizationCodeSunBirdCNegTC/AuthorizationCodeSunBirdCNegTC, outputTemplate=esignet/SunBirdCNegTC/AuthorizationCodeSunBirdCNegTC/AuthorizationCodeSunBirdCNegTCResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=To Authenticate the user for SunBirdC with null value in scope, uniqueIdentifier=TC_ESignet_AuthorizationCodeSunBirdCNegTC_08, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: Service not deployed. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:125)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_AuthorizationCode_SunBirdCNegTC_SpaceVal_Scope_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_AuthorizationCode_SunBirdCNegTC_SpaceVal_Scope_Neg, endPoint=$ESIGNETMOCKBASEURL$/v1/esignet/authorization/auth-code, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_SunBirdCNegTC_Scen6_AuthCode_Valid_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_SunBirdCNegTC_Scen6_AuthCode_Valid_sid_transactionId$", "permittedAuthorizeScopes": [{scope: " "}] }, output={ "errors": [ { "errorCode": "invalid_permitted_scope" } ] }, inputTemplate=esignet/SunBirdCNegTC/AuthorizationCodeSunBirdCNegTC/AuthorizationCodeSunBirdCNegTC, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=To Authenticate the user for SunBirdC with space value in scope, uniqueIdentifier=TC_ESignet_AuthorizationCodeSunBirdCNegTC_06, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: Service not deployed. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:125)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_GenerateTokenSunBirdCNegTC_Empty_Code_Verifier_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenIdForUrlEncoded |
| Testcase Input |
| testCaseName=ESignet_GenerateTokenSunBirdCNegTC_Empty_Code_Verifier_Neg, endPoint=$ESIGNETMOCKBASEURL$/v1/esignet/oauth/v2/token, role=resident, templateFields=null, input={ "grant_type": "authorization_code", "code": "$ID:AuthorizationCode_SunBirdCNegTC_All_Valid_sid_code$", "client_id": "$ID:CreateOIDCClientV2SunBirdC_all_Valid_Smoke_sid_clientId$", "client_assertion_type": "urn:ietf:params:oauth:client-assertion-type:jwt-bearer", "client_assertion": "$CLIENT_ASSERTION_USER4_JWK$", "redirect_uri": "$IDPREDIRECTURI$", "code_verifier": "" }, output={ "error": "invalid_request" }, inputTemplate=esignet/SunBirdCNegTC/GenerateTokenSunBirdCNegTC/GenerateTokenSunBirdCNegTC, outputTemplate=esignet/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=To Authenticate the user for SunBirdC with an empty code_verifier value, uniqueIdentifier=TC_ESignet_GenerateTokenSunBirdCNegTC_03, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: Service not deployed. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenIdForUrlEncoded.test(SimplePostForAutoGenIdForUrlEncoded.java:109)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_GenerateTokenSunBirdCNegTC_Invalid_Code_Verifier_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenIdForUrlEncoded |
| Testcase Input |
| testCaseName=ESignet_GenerateTokenSunBirdCNegTC_Invalid_Code_Verifier_Neg, endPoint=$ESIGNETMOCKBASEURL$/v1/esignet/oauth/v2/token, role=resident, templateFields=null, input={ "grant_type": "authorization_code", "code": "$ID:AuthorizationCode_SunBirdCNegTC_All_Valid_sid_code$", "client_id": "$ID:CreateOIDCClientV2SunBirdC_all_Valid_Smoke_sid_clientId$", "client_assertion_type": "urn:ietf:params:oauth:client-assertion-type:jwt-bearer", "client_assertion": "$CLIENT_ASSERTION_USER4_JWK$", "redirect_uri": "$IDPREDIRECTURI$", "code_verifier": "sdfgsfdhsfdhgfshfgsdgs" }, output={ "error": "invalid_request" }, inputTemplate=esignet/SunBirdCNegTC/GenerateTokenSunBirdCNegTC/GenerateTokenSunBirdCNegTC, outputTemplate=esignet/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=To Authenticate the user for SunBirdC with invalid code_verifier, uniqueIdentifier=TC_ESignet_GenerateTokenSunBirdCNegTC_01, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: Service not deployed. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenIdForUrlEncoded.test(SimplePostForAutoGenIdForUrlEncoded.java:109)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_GenerateTokenSunBirdCNegTC_Missing_Code_Verifier_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenIdForUrlEncoded |
| Testcase Input |
| testCaseName=ESignet_GenerateTokenSunBirdCNegTC_Missing_Code_Verifier_Neg, endPoint=$ESIGNETMOCKBASEURL$/v1/esignet/oauth/v2/token, role=resident, templateFields=null, input={ "grant_type": "authorization_code", "code": "$ID:AuthorizationCode_SunBirdCNegTC_All_Valid_sid_code$", "client_id": "$ID:CreateOIDCClientV2SunBirdC_all_Valid_Smoke_sid_clientId$", "client_assertion_type": "urn:ietf:params:oauth:client-assertion-type:jwt-bearer", "client_assertion": "$CLIENT_ASSERTION_USER4_JWK$", "redirect_uri": "$IDPREDIRECTURI$", "code_verifier": "$REMOVE$" }, output={ "error": "invalid_request" }, inputTemplate=esignet/SunBirdCNegTC/GenerateTokenSunBirdCNegTC/GenerateTokenSunBirdCNegTC, outputTemplate=esignet/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=To Authenticate the user for SunBirdC with missing code_verifier, uniqueIdentifier=TC_ESignet_GenerateTokenSunBirdCNegTC_02, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: Service not deployed. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenIdForUrlEncoded.test(SimplePostForAutoGenIdForUrlEncoded.java:109)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_GenerateTokenSunBirdCNegTC_Null_Code_Verifier_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenIdForUrlEncoded |
| Testcase Input |
| testCaseName=ESignet_GenerateTokenSunBirdCNegTC_Null_Code_Verifier_Neg, endPoint=$ESIGNETMOCKBASEURL$/v1/esignet/oauth/v2/token, role=resident, templateFields=null, input={ "grant_type": "authorization_code", "code": "$ID:AuthorizationCode_SunBirdCNegTC_All_Valid_sid_code$", "client_id": "$ID:CreateOIDCClientV2SunBirdC_all_Valid_Smoke_sid_clientId$", "client_assertion_type": "urn:ietf:params:oauth:client-assertion-type:jwt-bearer", "client_assertion": "$CLIENT_ASSERTION_USER4_JWK$", "redirect_uri": "$IDPREDIRECTURI$", "code_verifier": "null" }, output={ "error": "invalid_request" }, inputTemplate=esignet/SunBirdCNegTC/GenerateTokenSunBirdCNegTC/GenerateTokenSunBirdCNegTC, outputTemplate=esignet/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=To Authenticate the user for SunBirdC with null value in code_verifier, uniqueIdentifier=TC_ESignet_GenerateTokenSunBirdCNegTC_05, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: Service not deployed. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenIdForUrlEncoded.test(SimplePostForAutoGenIdForUrlEncoded.java:109)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_GenerateTokenSunBirdCNegTC_SpaceVal_Code_Verifier_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenIdForUrlEncoded |
| Testcase Input |
| testCaseName=ESignet_GenerateTokenSunBirdCNegTC_SpaceVal_Code_Verifier_Neg, endPoint=$ESIGNETMOCKBASEURL$/v1/esignet/oauth/v2/token, role=resident, templateFields=null, input={ "grant_type": "authorization_code", "code": "$ID:AuthorizationCode_SunBirdCNegTC_All_Valid_sid_code$", "client_id": "$ID:CreateOIDCClientV2SunBirdC_all_Valid_Smoke_sid_clientId$", "client_assertion_type": "urn:ietf:params:oauth:client-assertion-type:jwt-bearer", "client_assertion": "$CLIENT_ASSERTION_USER4_JWK$", "redirect_uri": "$IDPREDIRECTURI$", "code_verifier": " " }, output={ "error": "invalid_request" }, inputTemplate=esignet/SunBirdCNegTC/GenerateTokenSunBirdCNegTC/GenerateTokenSunBirdCNegTC, outputTemplate=esignet/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=To Authenticate the user for SunBirdC with space value in code_verifier, uniqueIdentifier=TC_ESignet_GenerateTokenSunBirdCNegTC_04, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: Service not deployed. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenIdForUrlEncoded.test(SimplePostForAutoGenIdForUrlEncoded.java:109)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_GenerateTokenSunBirdCNegTC_Valid_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenIdForUrlEncoded |
| Testcase Input |
| testCaseName=ESignet_GenerateTokenSunBirdCNegTC_Valid_sid, endPoint=$ESIGNETMOCKBASEURL$/v1/esignet/oauth/v2/token, role=resident, templateFields=null, input={ "grant_type": "authorization_code", "code": "$ID:AuthorizationCode_SunBirdCNegTC_All_Valid_sid_code$", "client_id": "$ID:CreateOIDCClientV2SunBirdC_all_Valid_Smoke_sid_clientId$", "client_assertion_type": "urn:ietf:params:oauth:client-assertion-type:jwt-bearer", "client_assertion": "$CLIENT_ASSERTION_USER4_JWK$", "redirect_uri": "$IDPREDIRECTURI$", "code_verifier": "$CODEVERIFIER$" }, output={ "token_type": "Bearer" }, inputTemplate=esignet/SunBirdCNegTC/GenerateTokenSunBirdCNegTC/GenerateTokenSunBirdCNegTC, outputTemplate=esignet/SunBirdCNegTC/GenerateTokenSunBirdCNegTC/GenerateTokenSunBirdCNegTCResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=To Authenticate the user for SunBirdC with invalid data, uniqueIdentifier=TC_ESignet_GenerateTokenSunBirdCNegTC_06, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: Service not deployed. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenIdForUrlEncoded.test(SimplePostForAutoGenIdForUrlEncoded.java:109)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_SunBirdR_DeletePolicy_NOAUTH_Valid_Smoke |
| Testcase Dependency |
| [] |
| Class Name |
| DeleteWithParam |
| Testcase Input |
| testCaseName=ESignet_SunBirdR_DeletePolicy_NOAUTH_Valid_Smoke, endPoint=$SUNBIRDBASEURL$/api/v1/Insurance/{insuranceid}, role=resident, templateFields=null, input={ "insuranceid": "$ID:SunBirdR_CreatePolicy_NOAUTH_Valid_Smoke_Sid_osid$" }, output={ "status": "SUCCESSFUL" }, inputTemplate=esignet/SunBirdR/DeletePolicySunBirdR/DeletePolicySunBirdR, outputTemplate=esignet/SunBirdR/DeletePolicySunBirdR/DeletePolicySunBirdRResult, restMethod=delete, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=To delete policy for SunBirdR with no authorization, uniqueIdentifier=TC_ESignet_DeletePolicySunBirdR_01, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:203)
at io.mosip.testrig.apirig.esignet.testscripts.DeleteWithParam.test(DeleteWithParam.java:82)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_CreateOIDCClientV3_all_Valid_Smoke_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_CreateOIDCClientV3_all_Valid_Smoke_sid, endPoint=/v1/esignet/client-mgmt/client, role=partner, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$RANDOMPARTNERID$", "clientName": "MOSIP OIDC Client", "logoUri": "https://health-services.com/logo.png", "relyingPartyId": "Bharathi-Inc", "redirectUris": "$IDPREDIRECTURI$", "publicKey": "$JWKKEY$", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{"acrValues": "mosip:idp:acr:static-code"},{"acrValues": "mosip:idp:acr:generated-code"},{"acrValues": "mosip:idp:acr:biometrics"}], "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt", "keyLang1": "$1STLANG$", "clientNameLang": "MOSIP OIDC Client", "userinfo_response_type": "JWS", "purpose_title": "title", "purpose_type": "verify", "purpose_subTitle": "subtitle", "signup_banner_required": true, "forgot_pwd_link_required": true, "consent_expire_in_mins": 30 }, output={ "status": "ACTIVE" }, inputTemplate=esignet/CreateOIDCClientV3/CreateOIDCClient, outputTemplate=esignet/CreateOIDCClientV3/CreateOIDCClientResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=To create OIDC Client V3 with all valid data, uniqueIdentifier=TC_ESignet_CreateOIDCClientV3_01, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_CreateOIDCClientV3_all_Valid_responseType_Smoke_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_CreateOIDCClientV3_all_Valid_responseType_Smoke_sid, endPoint=/v1/esignet/client-mgmt/client, role=partner, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$RANDOMPARTNERID$", "clientName": "MOSIP OIDC Client", "logoUri": "https://health-services.com/logo.png", "relyingPartyId": "Bharathi-Inc", "redirectUris": "$IDPREDIRECTURI$", "publicKey": "$JWKKEY$", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{acrValues: "mosip:idp:acr:static-code"},{acrValues: "mosip:idp:acr:generated-code"},{acrValues: "mosip:idp:acr:biometrics"}], "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt", "keyLang1": "$1STLANG$", "clientNameLang": "MOSIP OIDC Client", "userinfo_response_type": "JWE", "purpose_title": "title", "purpose_type": "verify", "purpose_subTitle": "subtitle", "signup_banner_required": true, "forgot_pwd_link_required": true, "consent_expire_in_mins": 30 }, output={ "status": "ACTIVE" }, inputTemplate=esignet/CreateOIDCClientV3/CreateOIDCClient, outputTemplate=esignet/CreateOIDCClientV3/CreateOIDCClientResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=To create OIDC Client V3 with all valid data, uniqueIdentifier=TC_ESignet_CreateOIDCClientV3_02, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_CreateOIDCClientV3_arrayOfValues_userinfoResponse |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_CreateOIDCClientV3_arrayOfValues_userinfoResponse, endPoint=/v1/esignet/client-mgmt/client, role=partner, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$RANDOMPARTNERID$", "clientName": "MOSIP OIDC Client", "logoUri": "https://health-services.com/logo.png", "relyingPartyId": "Bharathi-Inc", "redirectUris": "$IDPREDIRECTURI$", "publicKey": "$JWKKEY$", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{acrValues: "mosip:idp:acr:static-code"},{acrValues: "mosip:idp:acr:generated-code"},{acrValues: "mosip:idp:acr:biometrics"}], "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt", "keyLang1": "$1STLANG$", "clientNameLang": "MOSIP OIDC Client", "userinfo_response_type": ["JWS", "JWE"], "purpose_title": "title", "purpose_type": "verify", "purpose_subTitle": "subtitle", "signup_banner_required": true, "forgot_pwd_link_required": true, "consent_expire_in_mins": 30 }, output={ "errors": [ { "errorCode": "invalid_additional_config" } ] }, inputTemplate=esignet/CreateOIDCClientV3/CreateOIDCClient, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=To create OIDC Client V3 with arrays of values userinfoResponse, uniqueIdentifier=TC_ESignet_CreateOIDCClientV3_07, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_CreateOIDCClientV3_emptyStringValue_UserInfoResponseType |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_CreateOIDCClientV3_emptyStringValue_UserInfoResponseType, endPoint=/v1/esignet/client-mgmt/client, role=partner, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$RANDOMPARTNERID$", "clientName": "MOSIP OIDC Client", "logoUri": "https://health-services.com/logo.png", "relyingPartyId": "Bharathi-Inc", "redirectUris": "$IDPREDIRECTURI$", "publicKey": "$JWKKEY$", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{acrValues: "mosip:idp:acr:static-code"},{acrValues: "mosip:idp:acr:generated-code"},{acrValues: "mosip:idp:acr:biometrics"}], "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt", "keyLang1": "$1STLANG$", "clientNameLang": "MOSIP OIDC Client", "userinfo_response_type": " ", "purpose_title": "title", "purpose_type": "verify", "purpose_subTitle": "subtitle", "signup_banner_required": true, "forgot_pwd_link_required": true, "consent_expire_in_mins": 30 }, output={ "errors": [ { "errorCode": "invalid_additional_config" } ] }, inputTemplate=esignet/CreateOIDCClientV3/CreateOIDCClient, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=To create OIDC Client V3 with empty string value, uniqueIdentifier=TC_ESignet_CreateOIDCClientV3_06, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_CreateOIDCClientV3_empty_responseType |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_CreateOIDCClientV3_empty_responseType, endPoint=/v1/esignet/client-mgmt/client, role=partner, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$RANDOMPARTNERID$", "clientName": "MOSIP OIDC Client", "logoUri": "https://health-services.com/logo.png", "relyingPartyId": "Bharathi-Inc", "redirectUris": "$IDPREDIRECTURI$", "publicKey": "$JWKKEY$", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{acrValues: "mosip:idp:acr:static-code"},{acrValues: "mosip:idp:acr:generated-code"},{acrValues: "mosip:idp:acr:biometrics"}], "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt", "keyLang1": "$1STLANG$", "clientNameLang": "MOSIP OIDC Client", "userinfo_response_type": "", "purpose_title": "title", "purpose_type": "verify", "purpose_subTitle": "subtitle", "signup_banner_required": true, "forgot_pwd_link_required": true, "consent_expire_in_mins": 30 }, output={ "errors": [ { "errorCode": "invalid_additional_config" } ] }, inputTemplate=esignet/CreateOIDCClientV3/CreateOIDCClient, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=To create OIDC Client V3 with empty userinfo response type, uniqueIdentifier=TC_ESignet_CreateOIDCClientV3_05, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_CreateOIDCClientV3_invalid_responseType |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_CreateOIDCClientV3_invalid_responseType, endPoint=/v1/esignet/client-mgmt/client, role=partner, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$RANDOMPARTNERID$", "clientName": "MOSIP OIDC Client", "logoUri": "https://health-services.com/logo.png", "relyingPartyId": "Bharathi-Inc", "redirectUris": "$IDPREDIRECTURI$", "publicKey": "$JWKKEY$", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{acrValues: "mosip:idp:acr:static-code"},{acrValues: "mosip:idp:acr:generated-code"},{acrValues: "mosip:idp:acr:biometrics"}], "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt", "keyLang1": "$1STLANG$", "clientNameLang": "MOSIP OIDC Client", "userinfo_response_type": "swj", "purpose_title": "title", "purpose_type": "verify", "purpose_subTitle": "subtitle", "signup_banner_required": true, "forgot_pwd_link_required": true, "consent_expire_in_mins": 30 }, output={ "errors": [ { "errorCode": "invalid_additional_config" } ] }, inputTemplate=esignet/CreateOIDCClientV3/CreateOIDCClient, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=To create OIDC Client V3 with invalid userinfo response type, uniqueIdentifier=TC_ESignet_CreateOIDCClientV3_03, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_CreateOIDCClientV3_subtitle_languageMap_Smoke_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_CreateOIDCClientV3_subtitle_languageMap_Smoke_sid, endPoint=/v1/esignet/client-mgmt/client, role=partner, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$RANDOMPARTNERID$", "clientName": "MOSIP OIDC Client", "logoUri": "https://health-services.com/logo.png", "relyingPartyId": "Bharathi-Inc", "redirectUris": "$IDPREDIRECTURI$", "publicKey": "$JWKKEY$", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{"acrValues": "mosip:idp:acr:static-code"},{"acrValues": "mosip:idp:acr:generated-code"},{"acrValues": "mosip:idp:acr:biometrics"}], "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt", "keyLang1": "$1STLANG$", "clientNameLang": "MOSIP OIDC Client", "userinfo_response_type": "JWS", "purpose_title": "Verify your identity", "purpose_type": "verify", "purpose_subTitle": "Please provide the following details to verify your identity", "subTitleNameLang": "Please provide the following details to verify your identity", "signup_banner_required": true, "forgot_pwd_link_required": true, "consent_expire_in_mins": 30 }, output={ "status": "ACTIVE" }, inputTemplate=esignet/CreateOIDCClientV3/CreateOIDCClientSubtitleLangMap, outputTemplate=esignet/CreateOIDCClientV3/CreateOIDCClientResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=To create OIDC Client V3 with multilingual value in subtitle field, uniqueIdentifier=TC_ESignet_CreateOIDCClientV3_25, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_CreateOIDCClientV3_title_languageMap_Smoke_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_CreateOIDCClientV3_title_languageMap_Smoke_sid, endPoint=/v1/esignet/client-mgmt/client, role=partner, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$RANDOMPARTNERID$", "clientName": "MOSIP OIDC Client", "logoUri": "https://health-services.com/logo.png", "relyingPartyId": "Bharathi-Inc", "redirectUris": "$IDPREDIRECTURI$", "publicKey": "$JWKKEY$", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{"acrValues": "mosip:idp:acr:static-code"},{"acrValues": "mosip:idp:acr:generated-code"},{"acrValues": "mosip:idp:acr:biometrics"}], "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt", "keyLang1": "$1STLANG$", "clientNameLang": "MOSIP OIDC Client", "userinfo_response_type": "JWS", "purpose_title": "Verify your identity", "titleNameLang": "Verify your identity", "purpose_type": "verify", "purpose_subTitle": "Please provide details", "signup_banner_required": true, "forgot_pwd_link_required": true, "consent_expire_in_mins": 30 }, output={ "status": "ACTIVE" }, inputTemplate=esignet/CreateOIDCClientV3/CreateOIDCClientTitleLangMap, outputTemplate=esignet/CreateOIDCClientV3/CreateOIDCClientResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=To create OIDC Client V3 with multilingual value in title field, uniqueIdentifier=TC_ESignet_CreateOIDCClientV3_24, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_CreateOIDCClientV3_unsupported_responseType |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_CreateOIDCClientV3_unsupported_responseType, endPoint=/v1/esignet/client-mgmt/client, role=partner, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$RANDOMPARTNERID$", "clientName": "MOSIP OIDC Client", "logoUri": "https://health-services.com/logo.png", "relyingPartyId": "Bharathi-Inc", "redirectUris": "$IDPREDIRECTURI$", "publicKey": "$JWKKEY$", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{acrValues: "mosip:idp:acr:static-code"},{acrValues: "mosip:idp:acr:generated-code"},{acrValues: "mosip:idp:acr:biometrics"}], "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt", "keyLang1": "$1STLANG$", "clientNameLang": "MOSIP OIDC Client", "userinfo_response_type": "JWK", "purpose_title": "title", "purpose_type": "verify", "purpose_subTitle": "subtitle", "signup_banner_required": true, "forgot_pwd_link_required": true, "consent_expire_in_mins": 30 }, output={ "errors": [ { "errorCode": "invalid_additional_config" } ] }, inputTemplate=esignet/CreateOIDCClientV3/CreateOIDCClient, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=To create OIDC Client V3 with unsupported userinfo response type, uniqueIdentifier=TC_ESignet_CreateOIDCClientV3_04, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_CreateOIDCClientV3_with_arrayOfValues_purpose_type |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_CreateOIDCClientV3_with_arrayOfValues_purpose_type, endPoint=/v1/esignet/client-mgmt/client, role=partner, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$RANDOMPARTNERID$", "clientName": "MOSIP OIDC Client", "logoUri": "https://health-services.com/logo.png", "relyingPartyId": "Bharathi-Inc", "redirectUris": "$IDPREDIRECTURI$", "publicKey": "$JWKKEY$", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{acrValues: "mosip:idp:acr:static-code"},{acrValues: "mosip:idp:acr:generated-code"},{acrValues: "mosip:idp:acr:biometrics"}], "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt", "keyLang1": "$1STLANG$", "clientNameLang": "MOSIP OIDC Client", "userinfo_response_type": "JWE", "purpose_title": "title", "purpose_type": ["verify", "link", "login"], "purpose_subTitle": "subtitle", "signup_banner_required": true, "forgot_pwd_link_required": true, "consent_expire_in_mins": 30 }, output={ "errors": [ { "errorCode": "invalid_additional_config" } ] }, inputTemplate=esignet/CreateOIDCClientV3/CreateOIDCClient, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=To create OIDC Client V3 with purpose_type as arrayOfValues, uniqueIdentifier=TC_ESignet_CreateOIDCClientV3_13, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_CreateOIDCClientV3_with_empty_purpose_type |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_CreateOIDCClientV3_with_empty_purpose_type, endPoint=/v1/esignet/client-mgmt/client, role=partner, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$RANDOMPARTNERID$", "clientName": "MOSIP OIDC Client", "logoUri": "https://health-services.com/logo.png", "relyingPartyId": "Bharathi-Inc", "redirectUris": "$IDPREDIRECTURI$", "publicKey": "$JWKKEY$", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{acrValues: "mosip:idp:acr:static-code"},{acrValues: "mosip:idp:acr:generated-code"},{acrValues: "mosip:idp:acr:biometrics"}], "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt", "keyLang1": "$1STLANG$", "clientNameLang": "MOSIP OIDC Client", "userinfo_response_type": "JWE", "purpose_title": "title", "purpose_type": "", "purpose_subTitle": "subtitle", "signup_banner_required": true, "forgot_pwd_link_required": true, "consent_expire_in_mins": 30 }, output={ "errors": [ { "errorCode": "invalid_additional_config" } ] }, inputTemplate=esignet/CreateOIDCClientV3/CreateOIDCClient, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=To create OIDC Client V3 with empty purpose_type, uniqueIdentifier=TC_ESignet_CreateOIDCClientV3_11, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_CreateOIDCClientV3_with_empty_stringValue_in_subtitle_Smoke_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_CreateOIDCClientV3_with_empty_stringValue_in_subtitle_Smoke_sid, endPoint=/v1/esignet/client-mgmt/client, role=partner, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$RANDOMPARTNERID$", "clientName": "MOSIP OIDC Client", "logoUri": "https://health-services.com/logo.png", "relyingPartyId": "Bharathi-Inc", "redirectUris": "$IDPREDIRECTURI$", "publicKey": "$JWKKEY$", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{acrValues: "mosip:idp:acr:static-code"},{acrValues: "mosip:idp:acr:generated-code"},{acrValues: "mosip:idp:acr:biometrics"}], "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt", "keyLang1": "$1STLANG$", "clientNameLang": "MOSIP OIDC Client", "userinfo_response_type": "JWE", "purpose_title": "title", "purpose_type": "login", "purpose_subTitle": " ", "signup_banner_required": true, "forgot_pwd_link_required": true, "consent_expire_in_mins": 30 }, output={ "status": "ACTIVE" }, inputTemplate=esignet/CreateOIDCClientV3/CreateOIDCClient, outputTemplate=esignet/CreateOIDCClientV3/CreateOIDCClientResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=To create OIDC Client V3 with empty string value in subtitle, uniqueIdentifier=TC_ESignet_CreateOIDCClientV3_17, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_CreateOIDCClientV3_with_empty_stringValue_purpose_type |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_CreateOIDCClientV3_with_empty_stringValue_purpose_type, endPoint=/v1/esignet/client-mgmt/client, role=partner, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$RANDOMPARTNERID$", "clientName": "MOSIP OIDC Client", "logoUri": "https://health-services.com/logo.png", "relyingPartyId": "Bharathi-Inc", "redirectUris": "$IDPREDIRECTURI$", "publicKey": "$JWKKEY$", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{acrValues: "mosip:idp:acr:static-code"},{acrValues: "mosip:idp:acr:generated-code"},{acrValues: "mosip:idp:acr:biometrics"}], "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt", "keyLang1": "$1STLANG$", "clientNameLang": "MOSIP OIDC Client", "userinfo_response_type": "JWE", "purpose_title": "title", "purpose_type": " ", "purpose_subTitle": "subtitle", "signup_banner_required": true, "forgot_pwd_link_required": true, "consent_expire_in_mins": 30 }, output={ "errors": [ { "errorCode": "invalid_additional_config" } ] }, inputTemplate=esignet/CreateOIDCClientV3/CreateOIDCClient, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=To create OIDC Client V3 with empty purpose_type, uniqueIdentifier=TC_ESignet_CreateOIDCClientV3_12, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_CreateOIDCClientV3_with_empty_stringValue_title_Smoke_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_CreateOIDCClientV3_with_empty_stringValue_title_Smoke_sid, endPoint=/v1/esignet/client-mgmt/client, role=partner, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$RANDOMPARTNERID$", "clientName": "MOSIP OIDC Client", "logoUri": "https://health-services.com/logo.png", "relyingPartyId": "Bharathi-Inc", "redirectUris": "$IDPREDIRECTURI$", "publicKey": "$JWKKEY$", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{acrValues: "mosip:idp:acr:static-code"},{acrValues: "mosip:idp:acr:generated-code"},{acrValues: "mosip:idp:acr:biometrics"}], "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt", "keyLang1": "$1STLANG$", "clientNameLang": "MOSIP OIDC Client", "userinfo_response_type": "JWE", "purpose_title": " ", "purpose_type": "login", "purpose_subTitle": "subtitle", "signup_banner_required": true, "forgot_pwd_link_required": true, "consent_expire_in_mins": 30 }, output={ "status": "ACTIVE" }, inputTemplate=esignet/CreateOIDCClientV3/CreateOIDCClient, outputTemplate=esignet/CreateOIDCClientV3/CreateOIDCClientResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=To create OIDC Client V3 with empty stringValue in title, uniqueIdentifier=TC_ESignet_CreateOIDCClientV3_16, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_CreateOIDCClientV3_with_empty_subtitle_Smoke_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_CreateOIDCClientV3_with_empty_subtitle_Smoke_sid, endPoint=/v1/esignet/client-mgmt/client, role=partner, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$RANDOMPARTNERID$", "clientName": "MOSIP OIDC Client", "logoUri": "https://health-services.com/logo.png", "relyingPartyId": "Bharathi-Inc", "redirectUris": "$IDPREDIRECTURI$", "publicKey": "$JWKKEY$", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{acrValues: "mosip:idp:acr:static-code"},{acrValues: "mosip:idp:acr:generated-code"},{acrValues: "mosip:idp:acr:biometrics"}], "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt", "keyLang1": "$1STLANG$", "clientNameLang": "MOSIP OIDC Client", "userinfo_response_type": "JWE", "purpose_title": "title", "purpose_type": "login", "purpose_subTitle": "", "signup_banner_required": true, "forgot_pwd_link_required": true, "consent_expire_in_mins": 30 }, output={ "status": "ACTIVE" }, inputTemplate=esignet/CreateOIDCClientV3/CreateOIDCClient, outputTemplate=esignet/CreateOIDCClientV3/CreateOIDCClientResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=To create OIDC Client V3 with empty subtitle, uniqueIdentifier=TC_ESignet_CreateOIDCClientV3_15, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_CreateOIDCClientV3_with_empty_title_Smoke_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_CreateOIDCClientV3_with_empty_title_Smoke_sid, endPoint=/v1/esignet/client-mgmt/client, role=partner, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$RANDOMPARTNERID$", "clientName": "MOSIP OIDC Client", "logoUri": "https://health-services.com/logo.png", "relyingPartyId": "Bharathi-Inc", "redirectUris": "$IDPREDIRECTURI$", "publicKey": "$JWKKEY$", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{acrValues: "mosip:idp:acr:static-code"},{acrValues: "mosip:idp:acr:generated-code"},{acrValues: "mosip:idp:acr:biometrics"}], "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt", "keyLang1": "$1STLANG$", "clientNameLang": "MOSIP OIDC Client", "userinfo_response_type": "JWE", "purpose_title": "", "purpose_type": "login", "purpose_subTitle": "subtitle", "signup_banner_required": true, "forgot_pwd_link_required": true, "consent_expire_in_mins": 30 }, output={ "status": "ACTIVE" }, inputTemplate=esignet/CreateOIDCClientV3/CreateOIDCClient, outputTemplate=esignet/CreateOIDCClientV3/CreateOIDCClientResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=To create OIDC Client V3 with empty title, uniqueIdentifier=TC_ESignet_CreateOIDCClientV3_14, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_CreateOIDCClientV3_with_false_forgot_pwd_link_required_Smoke_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_CreateOIDCClientV3_with_false_forgot_pwd_link_required_Smoke_sid, endPoint=/v1/esignet/client-mgmt/client, role=partner, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$RANDOMPARTNERID$", "clientName": "MOSIP OIDC Client", "logoUri": "https://health-services.com/logo.png", "relyingPartyId": "Bharathi-Inc", "redirectUris": "$IDPREDIRECTURI$", "publicKey": "$JWKKEY$", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{"acrValues": "mosip:idp:acr:static-code"},{"acrValues": "mosip:idp:acr:generated-code"},{"acrValues": "mosip:idp:acr:biometrics"}], "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt", "keyLang1": "$1STLANG$", "clientNameLang": "MOSIP OIDC Client", "userinfo_response_type": "JWS", "purpose_title": "title", "purpose_type": "verify", "purpose_subTitle": "subtitle", "signup_banner_required": true, "forgot_pwd_link_required": false, "consent_expire_in_mins": 30 }, output={ "status": "ACTIVE" }, inputTemplate=esignet/CreateOIDCClientV3/CreateOIDCClient, outputTemplate=esignet/CreateOIDCClientV3/CreateOIDCClientResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=To create OIDC Client V3 with false forgot_pwd_link_required value, uniqueIdentifier=TC_ESignet_CreateOIDCClientV3_20, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_CreateOIDCClientV3_with_false_signup_banner_required_Smoke_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_CreateOIDCClientV3_with_false_signup_banner_required_Smoke_sid, endPoint=/v1/esignet/client-mgmt/client, role=partner, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$RANDOMPARTNERID$", "clientName": "MOSIP OIDC Client", "logoUri": "https://health-services.com/logo.png", "relyingPartyId": "Bharathi-Inc", "redirectUris": "$IDPREDIRECTURI$", "publicKey": "$JWKKEY$", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{"acrValues": "mosip:idp:acr:static-code"},{"acrValues": "mosip:idp:acr:generated-code"},{"acrValues": "mosip:idp:acr:biometrics"}], "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt", "keyLang1": "$1STLANG$", "clientNameLang": "MOSIP OIDC Client", "userinfo_response_type": "JWS", "purpose_title": "title", "purpose_type": "verify", "purpose_subTitle": "subtitle", "signup_banner_required": false, "forgot_pwd_link_required": true, "consent_expire_in_mins": 30 }, output={ "status": "ACTIVE" }, inputTemplate=esignet/CreateOIDCClientV3/CreateOIDCClient, outputTemplate=esignet/CreateOIDCClientV3/CreateOIDCClientResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=To create OIDC Client V3 with false signup_banner_required value, uniqueIdentifier=TC_ESignet_CreateOIDCClientV3_18, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_CreateOIDCClientV3_with_invalid_consent_expire_in_mins_Value |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_CreateOIDCClientV3_with_invalid_consent_expire_in_mins_Value, endPoint=/v1/esignet/client-mgmt/client, role=partner, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$RANDOMPARTNERID$", "clientName": "MOSIP OIDC Client", "logoUri": "https://health-services.com/logo.png", "relyingPartyId": "Bharathi-Inc", "redirectUris": "$IDPREDIRECTURI$", "publicKey": "$JWKKEY$", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{acrValues: "mosip:idp:acr:static-code"},{acrValues: "mosip:idp:acr:generated-code"},{acrValues: "mosip:idp:acr:biometrics"}], "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt", "keyLang1": "$1STLANG$", "clientNameLang": "MOSIP OIDC Client", "userinfo_response_type": "JWE", "purpose_title": "title", "purpose_type": "verify", "purpose_subTitle": "subtitle", "signup_banner_required": true, "forgot_pwd_link_required": true, "consent_expire_in_mins": "309nsw" }, output={ "errors": [ { "errorCode": "invalid_additional_config" } ] }, inputTemplate=esignet/CreateOIDCClientV3/CreateOIDCClient2, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=To create OIDC Client V3 with invalid consent_expire_in_mins value, uniqueIdentifier=TC_ESignet_CreateOIDCClientV3_22, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_CreateOIDCClientV3_with_invalid_forgot_pwd_link_required_Value |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_CreateOIDCClientV3_with_invalid_forgot_pwd_link_required_Value, endPoint=/v1/esignet/client-mgmt/client, role=partner, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$RANDOMPARTNERID$", "clientName": "MOSIP OIDC Client", "logoUri": "https://health-services.com/logo.png", "relyingPartyId": "Bharathi-Inc", "redirectUris": "$IDPREDIRECTURI$", "publicKey": "$JWKKEY$", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{acrValues: "mosip:idp:acr:static-code"},{acrValues: "mosip:idp:acr:generated-code"},{acrValues: "mosip:idp:acr:biometrics"}], "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt", "keyLang1": "$1STLANG$", "clientNameLang": "MOSIP OIDC Client", "userinfo_response_type": "JWE", "purpose_title": "title", "purpose_type": "verify", "purpose_subTitle": "subtitle", "signup_banner_required": true, "forgot_pwd_link_required": "noyes", "consent_expire_in_mins": 30 }, output={ "errors": [ { "errorCode": "invalid_additional_config" } ] }, inputTemplate=esignet/CreateOIDCClientV3/CreateOIDCClient2, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=To create OIDC Client V3 with invalid forgot_pwd_link_required value, uniqueIdentifier=TC_ESignet_CreateOIDCClientV3_21, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_CreateOIDCClientV3_with_invalid_purpose_type |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_CreateOIDCClientV3_with_invalid_purpose_type, endPoint=/v1/esignet/client-mgmt/client, role=partner, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$RANDOMPARTNERID$", "clientName": "MOSIP OIDC Client", "logoUri": "https://health-services.com/logo.png", "relyingPartyId": "Bharathi-Inc", "redirectUris": "$IDPREDIRECTURI$", "publicKey": "$JWKKEY$", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{acrValues: "mosip:idp:acr:static-code"},{acrValues: "mosip:idp:acr:generated-code"},{acrValues: "mosip:idp:acr:biometrics"}], "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt", "keyLang1": "$1STLANG$", "clientNameLang": "MOSIP OIDC Client", "userinfo_response_type": "JWE", "purpose_title": "title", "purpose_type": "authenticationabc", "purpose_subTitle": "subtitle", "signup_banner_required": true, "forgot_pwd_link_required": true, "consent_expire_in_mins": 30 }, output={ "errors": [ { "errorCode": "invalid_additional_config" } ] }, inputTemplate=esignet/CreateOIDCClientV3/CreateOIDCClient, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=To create OIDC Client V3 with invalid purpose_type, uniqueIdentifier=TC_ESignet_CreateOIDCClientV3_10, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_CreateOIDCClientV3_with_invalid_signup_banner_required_Value |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_CreateOIDCClientV3_with_invalid_signup_banner_required_Value, endPoint=/v1/esignet/client-mgmt/client, role=partner, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$RANDOMPARTNERID$", "clientName": "MOSIP OIDC Client", "logoUri": "https://health-services.com/logo.png", "relyingPartyId": "Bharathi-Inc", "redirectUris": "$IDPREDIRECTURI$", "publicKey": "$JWKKEY$", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{acrValues: "mosip:idp:acr:static-code"},{acrValues: "mosip:idp:acr:generated-code"},{acrValues: "mosip:idp:acr:biometrics"}], "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt", "keyLang1": "$1STLANG$", "clientNameLang": "MOSIP OIDC Client", "userinfo_response_type": "JWE", "purpose_title": "title", "purpose_type": "verify", "purpose_subTitle": "subtitle", "signup_banner_required": "yyeesno", "forgot_pwd_link_required": true, "consent_expire_in_mins": 30 }, output={ "errors": [ { "errorCode": "invalid_additional_config" } ] }, inputTemplate=esignet/CreateOIDCClientV3/CreateOIDCClient2, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=To create OIDC Client V3 with invalid signup_banner_required value, uniqueIdentifier=TC_ESignet_CreateOIDCClientV3_19, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_CreateOIDCClientV3_with_purpose_type_link_Smoke_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_CreateOIDCClientV3_with_purpose_type_link_Smoke_sid, endPoint=/v1/esignet/client-mgmt/client, role=partner, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$RANDOMPARTNERID$", "clientName": "MOSIP OIDC Client", "logoUri": "https://health-services.com/logo.png", "relyingPartyId": "Bharathi-Inc", "redirectUris": "$IDPREDIRECTURI$", "publicKey": "$JWKKEY$", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{acrValues: "mosip:idp:acr:static-code"},{acrValues: "mosip:idp:acr:generated-code"},{acrValues: "mosip:idp:acr:biometrics"}], "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt", "keyLang1": "$1STLANG$", "clientNameLang": "MOSIP OIDC Client", "userinfo_response_type": "JWE", "purpose_title": "title", "purpose_type": "link", "purpose_subTitle": "subtitle", "signup_banner_required": true, "forgot_pwd_link_required": true, "consent_expire_in_mins": 30 }, output={ "status": "ACTIVE" }, inputTemplate=esignet/CreateOIDCClientV3/CreateOIDCClient, outputTemplate=esignet/CreateOIDCClientV3/CreateOIDCClientResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=To create OIDC Client V3 with link as a purpose_type, uniqueIdentifier=TC_ESignet_CreateOIDCClientV3_08, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_CreateOIDCClientV3_with_purpose_type_login_Smoke_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_CreateOIDCClientV3_with_purpose_type_login_Smoke_sid, endPoint=/v1/esignet/client-mgmt/client, role=partner, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$RANDOMPARTNERID$", "clientName": "MOSIP OIDC Client", "logoUri": "https://health-services.com/logo.png", "relyingPartyId": "Bharathi-Inc", "redirectUris": "$IDPREDIRECTURI$", "publicKey": "$JWKKEY$", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{acrValues: "mosip:idp:acr:static-code"},{acrValues: "mosip:idp:acr:generated-code"},{acrValues: "mosip:idp:acr:biometrics"}], "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt", "keyLang1": "$1STLANG$", "clientNameLang": "MOSIP OIDC Client", "userinfo_response_type": "JWE", "purpose_title": "title", "purpose_type": "login", "purpose_subTitle": "subtitle", "signup_banner_required": true, "forgot_pwd_link_required": true, "consent_expire_in_mins": 30 }, output={ "status": "ACTIVE" }, inputTemplate=esignet/CreateOIDCClientV3/CreateOIDCClient, outputTemplate=esignet/CreateOIDCClientV3/CreateOIDCClientResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=To create OIDC Client V3 with link as a purpose_type, uniqueIdentifier=TC_ESignet_CreateOIDCClientV3_09, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_CreateOIDCClientV3_without_purpose_type |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_CreateOIDCClientV3_without_purpose_type, endPoint=/v1/esignet/client-mgmt/client, role=partner, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$RANDOMPARTNERID$", "clientName": "MOSIP OIDC Client", "logoUri": "https://health-services.com/logo.png", "relyingPartyId": "Bharathi-Inc", "redirectUris": "$IDPREDIRECTURI$", "publicKey": "$JWKKEY$", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{acrValues: "mosip:idp:acr:static-code"},{acrValues: "mosip:idp:acr:generated-code"},{acrValues: "mosip:idp:acr:biometrics"}], "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt", "keyLang1": "$1STLANG$", "clientNameLang": "MOSIP OIDC Client", "userinfo_response_type": "JWE", "purpose_title": "title", "purpose_subTitle": "subtitle", "signup_banner_required": true, "forgot_pwd_link_required": true, "consent_expire_in_mins": 30 }, output={ "errors": [ { "errorCode": "invalid_additional_config" } ] }, inputTemplate=esignet/CreateOIDCClientV3/CreateOIDCClient, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=To create OIDC Client V3 without purpose_type, uniqueIdentifier=TC_ESignet_CreateOIDCClientV3_23, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_CreateOIDCClientV3_Empty_Public_Key_type_Neg_02 |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_CreateOIDCClientV3_Empty_Public_Key_type_Neg_02, endPoint=/v1/esignet/client-mgmt/client, role=partner, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$RANDOMPARTNERID$", "clientName": "MOSIP OIDC Client", "logoUri": "https://health-services.com/logo.png", "relyingPartyId": "Bharathi-Inc", "redirectUris": "$IDPREDIRECTURI$", "kty": "$REMOVE$", "e": "AQAB", "use": "sig", "kid": "RXby0U2xrdZcLq_X7U7TR0O646sSEWYsSsxCu8P6YGE", "alg": "RS", "n": "mfJudo-L9sy-1guqQwjCdg4ZkeR2KKlhId699HXxTSoh1wkFfPwIpq-nnXgvXC5oEj6pwifcwrfbcZiDS-yuaVRzQQ8GWiyZswE3mUzlplti3QlUU_yMt2mA2BtbfAKJ4iNvq24L2cxah7m0IchQEaacetp9NRxXlhqTpmcNunahsaMI7HnHI2D60gpsuC2F8VjtryV5eZDy2jI28UnTlFgaFc7J_UFNObtTIi8OOX5A4xAxPJ8gEceAEPz0zAU8ARzZIGYch7MbqmZN4YMLShoRub6F1a6xT_NBAjkmIhniBBre1goRwLfSFbn2ipnujP_rA-nVKF9Is-x1URLnWQ", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{"acrValues": "mosip:idp:acr:static-code"},{"acrValues": "mosip:idp:acr:generated-code"},{"acrValues": "mosip:idp:acr:biometrics"}], "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt", "keyLang1": "$1STLANG$", "clientNameLang": "MOSIP OIDC Client", "userinfo_response_type": "JWS", "purpose_title": "title", "purpose_type": "verify", "purpose_subTitle": "subtitle", "signup_banner_required": true, "forgot_pwd_link_required": true, "consent_expire_in_mins": 30 }, output={ "errors": [ { "errorCode": "invalid_public_key" } ] }, inputTemplate=esignet/CreateOIDCClientV3/CreateOIDCClientV3PublicKeyNegSce, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create OIDC Client V3 with Empty public key Type, uniqueIdentifier=TC_ESignet_CreateOIDCClientV3PublicKeyNegativeScenarios_02, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_CreateOIDCClientV3_Invalid_Public_Key_type_Neg_01 |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_CreateOIDCClientV3_Invalid_Public_Key_type_Neg_01, endPoint=/v1/esignet/client-mgmt/client, role=partner, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$RANDOMPARTNERID$", "clientName": "MOSIP OIDC Client", "logoUri": "https://health-services.com/logo.png", "relyingPartyId": "Bharathi-Inc", "redirectUris": "$IDPREDIRECTURI$", "kty": "XYZ", "e": "AQAB", "use": "sig", "kid": "RXby0U2xrdZcLq_X7U7TR0O646sSEWYsSsxCu8P6YGE", "alg": "RS256", "n": "mfJudo-L9sy-1guqQwjCdg4ZkeR2KKlhId699HXxTSoh1wkFfPwIpq-nnXgvXC5oEj6pwifcwrfbcZiDS-yuaVRzQQ8GWiyZswE3mUzlplti3QlUU_yMt2mA2BtbfAKJ4iNvq24L2cxah7m0IchQEaacetp9NRxXlhqTpmcNunahsaMI7HnHI2D60gpsuC2F8VjtryV5eZDy2jI28UnTlFgaFc7J_UFNObtTIi8OOX5A4xAxPJ8gEceAEPz0zAU8ARzZIGYch7MbqmZN4YMLShoRub6F1a6xT_NBAjkmIhniBBre1goRwLfSFbn2ipnujP_rA-nVKF9Is-x1URLnWQ", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{"acrValues": "mosip:idp:acr:static-code"},{"acrValues": "mosip:idp:acr:generated-code"},{"acrValues": "mosip:idp:acr:biometrics"}], "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt", "keyLang1": "$1STLANG$", "clientNameLang": "MOSIP OIDC Client", "userinfo_response_type": "JWS", "purpose_title": "title", "purpose_type": "verify", "purpose_subTitle": "subtitle", "signup_banner_required": true, "forgot_pwd_link_required": true, "consent_expire_in_mins": 30 }, output={ "errors": [ { "errorCode": "invalid_public_key" } ] }, inputTemplate=esignet/CreateOIDCClientV3/CreateOIDCClientV3PublicKeyNegSce, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create OIDC Client V3 with invalid public key Key type, uniqueIdentifier=TC_ESignet_CreateOIDCClientV3PublicKeyNegativeScenarios_01, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_CreateOIDCClientV3_Malformed_Public_Key_type_Neg_03 |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_CreateOIDCClientV3_Malformed_Public_Key_type_Neg_03, endPoint=/v1/esignet/client-mgmt/client, role=partner, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$RANDOMPARTNERID$", "clientName": "MOSIP OIDC Client", "logoUri": "https://health-services.com/logo.png", "relyingPartyId": "Bharathi-Inc", "redirectUris": "$IDPREDIRECTURI$", "kty": "1RSA1", "e": "AQAB", "use": "sig", "kid": "RXby0U2xrdZcLq_X7U7TR0O646sSEWYsSsxCu8P6YGE", "alg": "RS", "n": "mfJudo-L9sy-1guqQwjCdg4ZkeR2KKlhId699HXxTSoh1wkFfPwIpq-nnXgvXC5oEj6pwifcwrfbcZiDS-yuaVRzQQ8GWiyZswE3mUzlplti3QlUU_yMt2mA2BtbfAKJ4iNvq24L2cxah7m0IchQEaacetp9NRxXlhqTpmcNunahsaMI7HnHI2D60gpsuC2F8VjtryV5eZDy2jI28UnTlFgaFc7J_UFNObtTIi8OOX5A4xAxPJ8gEceAEPz0zAU8ARzZIGYch7MbqmZN4YMLShoRub6F1a6xT_NBAjkmIhniBBre1goRwLfSFbn2ipnujP_rA-nVKF9Is-x1URLnWQ", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{"acrValues": "mosip:idp:acr:static-code"},{"acrValues": "mosip:idp:acr:generated-code"},{"acrValues": "mosip:idp:acr:biometrics"}], "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt", "keyLang1": "$1STLANG$", "clientNameLang": "MOSIP OIDC Client", "userinfo_response_type": "JWS", "purpose_title": "title", "purpose_type": "verify", "purpose_subTitle": "subtitle", "signup_banner_required": true, "forgot_pwd_link_required": true, "consent_expire_in_mins": 30 }, output={ "errors": [ { "errorCode": "invalid_public_key" } ] }, inputTemplate=esignet/CreateOIDCClientV3/CreateOIDCClientV3PublicKeyNegSce, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create OIDC Client V3 with Malformed public key Type, uniqueIdentifier=TC_ESignet_CreateOIDCClientV3PublicKeyNegativeScenarios_03, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_UpdateOIDCClientV3_Invalid_clientid_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PutWithPathParamsAndBody |
| Testcase Input |
| testCaseName=ESignet_UpdateOIDCClientV3_Invalid_clientid_Neg, endPoint=/v1/esignet/client-mgmt/client/{clientId}, role=partner, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "status": "ACTIVE", "clientName": "MOSIP OIDC Client", "logoUri": "https://health-services.com/logo.png", "clientId": "twhedw12653721823", "redirectUris": "$IDPREDIRECTURI$", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{acrValues: "mosip:idp:acr:static-code"},{acrValues: "mosip:idp:acr:generated-code"},{acrValues: "mosip:idp:acr:biometrics"}], "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt", "keyLang1": "$1STLANG$", "clientNameLang": "MOSIP OIDC Client", "userinfo_response_type": "JWS", "purpose_title": "title", "purpose_type": "verify", "purpose_subTitle": "subtitle", "signup_banner_required": true, "forgot_pwd_link_required": true, "consent_expire_in_mins": 30 }, output={ "errors": [ { "errorCode": "invalid_client_id" } ] }, inputTemplate=esignet/UpdateOIDCClientV3/UpdateOIDCClient, outputTemplate=esignet/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=To update OIDC Client V3 with invalid clientid, uniqueIdentifier=TC_ESignet_UpdateOIDCClientV3_02, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_UpdateOIDCClientV3_all_Valid_Smoke |
| Testcase Dependency |
| [TC_ESignet_CreateOIDCClientV3_01] |
| Class Name |
| PutWithPathParamsAndBody |
| Testcase Input |
| testCaseName=ESignet_UpdateOIDCClientV3_all_Valid_Smoke, endPoint=/v1/esignet/client-mgmt/client/{clientId}, role=partner, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "status": "ACTIVE", "clientName": "MOSIP OIDC Client", "logoUri": "https://health-services.com/logo.png", "clientId": "$ID:CreateOIDCClientV3_all_Valid_Smoke_sid_clientId$", "redirectUris": "$IDPREDIRECTURI$", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{acrValues: "mosip:idp:acr:static-code"},{acrValues: "mosip:idp:acr:generated-code"},{acrValues: "mosip:idp:acr:biometrics"}], "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt", "keyLang1": "$1STLANG$", "clientNameLang": "MOSIP OIDC Client", "userinfo_response_type": "JWS", "purpose_title": "title", "purpose_type": "verify", "purpose_subTitle": "subtitle", "signup_banner_required": true, "forgot_pwd_link_required": true, "consent_expire_in_mins": 30 }, output={ "status": "ACTIVE" }, inputTemplate=esignet/UpdateOIDCClientV3/UpdateOIDCClient, outputTemplate=esignet/UpdateOIDCClientV3/UpdateOIDCClientResult, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=To update OIDC Client V3 with all valid data, uniqueIdentifier=TC_ESignet_UpdateOIDCClientV3_01, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_UpdateOIDCClientV3_arrayOfValues_userinfoResponse_Neg |
| Testcase Dependency |
| [TC_ESignet_CreateOIDCClientV3_01] |
| Class Name |
| PutWithPathParamsAndBody |
| Testcase Input |
| testCaseName=ESignet_UpdateOIDCClientV3_arrayOfValues_userinfoResponse_Neg, endPoint=/v1/esignet/client-mgmt/client/{clientId}, role=partner, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "status": "ACTIVE", "clientName": "MOSIP OIDC Client", "logoUri": "https://health-services.com/logo.png", "clientId": "$ID:CreateOIDCClientV3_all_Valid_Smoke_sid_clientId$", "redirectUris": "$IDPREDIRECTURI$", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{acrValues: "mosip:idp:acr:static-code"},{acrValues: "mosip:idp:acr:generated-code"},{acrValues: "mosip:idp:acr:biometrics"}], "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt", "keyLang1": "$1STLANG$", "clientNameLang": "MOSIP OIDC Client", "userinfo_response_type": ["JWS", "JWE"], "purpose_title": "title", "purpose_type": "verify", "purpose_subTitle": "subtitle", "signup_banner_required": true, "forgot_pwd_link_required": true, "consent_expire_in_mins": 30 }, output={ "errors": [ { "errorCode": "invalid_additional_config" } ] }, inputTemplate=esignet/UpdateOIDCClientV3/UpdateOIDCClient, outputTemplate=esignet/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=To update OIDC Client V3 with arrays of values in userinfoResponse, uniqueIdentifier=TC_ESignet_UpdateOIDCClientV3_08, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_UpdateOIDCClientV3_empty_StringValue_responseType_Neg |
| Testcase Dependency |
| [TC_ESignet_CreateOIDCClientV3_01] |
| Class Name |
| PutWithPathParamsAndBody |
| Testcase Input |
| testCaseName=ESignet_UpdateOIDCClientV3_empty_StringValue_responseType_Neg, endPoint=/v1/esignet/client-mgmt/client/{clientId}, role=partner, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "status": "ACTIVE", "clientName": "MOSIP OIDC Client", "logoUri": "https://health-services.com/logo.png", "clientId": "$ID:CreateOIDCClientV3_all_Valid_Smoke_sid_clientId$", "redirectUris": "$IDPREDIRECTURI$", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{acrValues: "mosip:idp:acr:static-code"},{acrValues: "mosip:idp:acr:generated-code"},{acrValues: "mosip:idp:acr:biometrics"}], "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt", "keyLang1": "$1STLANG$", "clientNameLang": "MOSIP OIDC Client", "userinfo_response_type": " ", "purpose_title": "title", "purpose_type": "verify", "purpose_subTitle": "subtitle", "signup_banner_required": true, "forgot_pwd_link_required": true, "consent_expire_in_mins": 30 }, output={ "errors": [ { "errorCode": "invalid_additional_config" } ] }, inputTemplate=esignet/UpdateOIDCClientV3/UpdateOIDCClient, outputTemplate=esignet/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=To update OIDC Client V3 with empty StringValue userinfo response type, uniqueIdentifier=TC_ESignet_UpdateOIDCClientV3_07, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_UpdateOIDCClientV3_empty_responseType_Neg |
| Testcase Dependency |
| [TC_ESignet_CreateOIDCClientV3_01] |
| Class Name |
| PutWithPathParamsAndBody |
| Testcase Input |
| testCaseName=ESignet_UpdateOIDCClientV3_empty_responseType_Neg, endPoint=/v1/esignet/client-mgmt/client/{clientId}, role=partner, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "status": "ACTIVE", "clientName": "MOSIP OIDC Client", "logoUri": "https://health-services.com/logo.png", "clientId": "$ID:CreateOIDCClientV3_all_Valid_Smoke_sid_clientId$", "redirectUris": "$IDPREDIRECTURI$", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{acrValues: "mosip:idp:acr:static-code"},{acrValues: "mosip:idp:acr:generated-code"},{acrValues: "mosip:idp:acr:biometrics"}], "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt", "keyLang1": "$1STLANG$", "clientNameLang": "MOSIP OIDC Client", "userinfo_response_type": "", "purpose_title": "title", "purpose_type": "verify", "purpose_subTitle": "subtitle", "signup_banner_required": true, "forgot_pwd_link_required": true, "consent_expire_in_mins": 30 }, output={ "errors": [ { "errorCode": "invalid_additional_config" } ] }, inputTemplate=esignet/UpdateOIDCClientV3/UpdateOIDCClient, outputTemplate=esignet/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=To update OIDC Client V3 with empty userinfo response type, uniqueIdentifier=TC_ESignet_UpdateOIDCClientV3_06, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_UpdateOIDCClientV3_invalid_responseType_Neg |
| Testcase Dependency |
| [TC_ESignet_CreateOIDCClientV3_01] |
| Class Name |
| PutWithPathParamsAndBody |
| Testcase Input |
| testCaseName=ESignet_UpdateOIDCClientV3_invalid_responseType_Neg, endPoint=/v1/esignet/client-mgmt/client/{clientId}, role=partner, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "status": "ACTIVE", "clientName": "MOSIP OIDC Client", "logoUri": "https://health-services.com/logo.png", "clientId": "$ID:CreateOIDCClientV3_all_Valid_Smoke_sid_clientId$", "redirectUris": "$IDPREDIRECTURI$", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{acrValues: "mosip:idp:acr:static-code"},{acrValues: "mosip:idp:acr:generated-code"},{acrValues: "mosip:idp:acr:biometrics"}], "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt", "keyLang1": "$1STLANG$", "clientNameLang": "MOSIP OIDC Client", "userinfo_response_type": "swj", "purpose_title": "title", "purpose_type": "verify", "purpose_subTitle": "subtitle", "signup_banner_required": true, "forgot_pwd_link_required": true, "consent_expire_in_mins": 30 }, output={ "errors": [ { "errorCode": "invalid_additional_config" } ] }, inputTemplate=esignet/UpdateOIDCClientV3/UpdateOIDCClient, outputTemplate=esignet/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=To update OIDC Client V3 with invalid_responseType, uniqueIdentifier=TC_ESignet_UpdateOIDCClientV3_04, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_UpdateOIDCClientV3_unsupported_responseType_Neg |
| Testcase Dependency |
| [TC_ESignet_CreateOIDCClientV3_01] |
| Class Name |
| PutWithPathParamsAndBody |
| Testcase Input |
| testCaseName=ESignet_UpdateOIDCClientV3_unsupported_responseType_Neg, endPoint=/v1/esignet/client-mgmt/client/{clientId}, role=partner, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "status": "ACTIVE", "clientName": "MOSIP OIDC Client", "logoUri": "https://health-services.com/logo.png", "clientId": "$ID:CreateOIDCClientV3_all_Valid_Smoke_sid_clientId$", "redirectUris": "$IDPREDIRECTURI$", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{acrValues: "mosip:idp:acr:static-code"},{acrValues: "mosip:idp:acr:generated-code"},{acrValues: "mosip:idp:acr:biometrics"}], "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt", "keyLang1": "$1STLANG$", "clientNameLang": "MOSIP OIDC Client", "userinfo_response_type": "JWK", "purpose_title": "title", "purpose_type": "verify", "purpose_subTitle": "subtitle", "signup_banner_required": true, "forgot_pwd_link_required": true, "consent_expire_in_mins": 30 }, output={ "errors": [ { "errorCode": "invalid_additional_config" } ] }, inputTemplate=esignet/UpdateOIDCClientV3/UpdateOIDCClient, outputTemplate=esignet/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=To update OIDC Client V3 with unsupported_responseType, uniqueIdentifier=TC_ESignet_UpdateOIDCClientV3_05, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_UpdateOIDCClientV3_with_SubtitleLangMap_Pos |
| Testcase Dependency |
| [] |
| Class Name |
| PutWithPathParamsAndBody |
| Testcase Input |
| testCaseName=ESignet_UpdateOIDCClientV3_with_SubtitleLangMap_Pos, endPoint=/v1/esignet/client-mgmt/client/{clientId}, role=partner, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "status": "ACTIVE", "clientName": "MOSIP OIDC Client", "logoUri": "https://health-services.com/logo.png", "clientId": "$ID:CreateOIDCClientV3_all_Valid_Smoke_sid_clientId$", "redirectUris": "$IDPREDIRECTURI$", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{acrValues: "mosip:idp:acr:static-code"},{acrValues: "mosip:idp:acr:generated-code"},{acrValues: "mosip:idp:acr:biometrics"}], "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt", "keyLang1": "$1STLANG$", "clientNameLang": "MOSIP OIDC Client", "userinfo_response_type": "JWS", "purpose_title": "Verify title", "purpose_type": "verify", "purpose_subTitle": "Verify subtitle", "subTitleNameLang": "Verify subtitle", "signup_banner_required": true, "forgot_pwd_link_required": false, "consent_expire_in_mins": 30 }, output={ "status": "ACTIVE" }, inputTemplate=esignet/UpdateOIDCClientV3/UpdateOIDCClientSubtitleLangMap, outputTemplate=esignet/UpdateOIDCClientV3/UpdateOIDCClientResult, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=To update OIDC Client V3 with Subtitle LangMap, uniqueIdentifier=TC_ESignet_UpdateOIDCClientV3_28, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_UpdateOIDCClientV3_with_TitleLangMap_Pos |
| Testcase Dependency |
| [] |
| Class Name |
| PutWithPathParamsAndBody |
| Testcase Input |
| testCaseName=ESignet_UpdateOIDCClientV3_with_TitleLangMap_Pos, endPoint=/v1/esignet/client-mgmt/client/{clientId}, role=partner, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "status": "ACTIVE", "clientName": "MOSIP OIDC Client", "logoUri": "https://health-services.com/logo.png", "clientId": "$ID:CreateOIDCClientV3_all_Valid_Smoke_sid_clientId$", "redirectUris": "$IDPREDIRECTURI$", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{acrValues: "mosip:idp:acr:static-code"},{acrValues: "mosip:idp:acr:generated-code"},{acrValues: "mosip:idp:acr:biometrics"}], "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt", "keyLang1": "$1STLANG$", "clientNameLang": "MOSIP OIDC Client", "userinfo_response_type": "JWS", "purpose_title": "Verify title", "titleNameLang": "Verify title", "purpose_type": "verify", "purpose_subTitle": "Verify subtitle", "signup_banner_required": true, "forgot_pwd_link_required": false, "consent_expire_in_mins": 30 }, output={ "status": "ACTIVE" }, inputTemplate=esignet/UpdateOIDCClientV3/UpdateOIDCClientTitleLangMap, outputTemplate=esignet/UpdateOIDCClientV3/UpdateOIDCClientResult, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=To update OIDC Client V3 with Title LangMap, uniqueIdentifier=TC_ESignet_UpdateOIDCClientV3_27, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_UpdateOIDCClientV3_with_Valid_userinfo_responseType_Smoke |
| Testcase Dependency |
| [TC_ESignet_CreateOIDCClientV3_01] |
| Class Name |
| PutWithPathParamsAndBody |
| Testcase Input |
| testCaseName=ESignet_UpdateOIDCClientV3_with_Valid_userinfo_responseType_Smoke, endPoint=/v1/esignet/client-mgmt/client/{clientId}, role=partner, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "status": "ACTIVE", "clientName": "MOSIP OIDC Client", "logoUri": "https://health-services.com/logo.png", "clientId": "$ID:CreateOIDCClientV3_all_Valid_Smoke_sid_clientId$", "redirectUris": "$IDPREDIRECTURI$", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{acrValues: "mosip:idp:acr:static-code"},{acrValues: "mosip:idp:acr:generated-code"},{acrValues: "mosip:idp:acr:biometrics"}], "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt", "keyLang1": "$1STLANG$", "clientNameLang": "MOSIP OIDC Client", "userinfo_response_type": "JWE", "purpose_title": "title", "purpose_type": "verify", "purpose_subTitle": "subtitle", "signup_banner_required": true, "forgot_pwd_link_required": true, "consent_expire_in_mins": 30 }, output={ "status": "ACTIVE" }, inputTemplate=esignet/UpdateOIDCClientV3/UpdateOIDCClient, outputTemplate=esignet/UpdateOIDCClientV3/UpdateOIDCClientResult, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=To update OIDC Client V3 with valid userinfo response type, uniqueIdentifier=TC_ESignet_UpdateOIDCClientV3_03, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_UpdateOIDCClientV3_with_arrayOfValues_purposeType_Neg |
| Testcase Dependency |
| [TC_ESignet_CreateOIDCClientV3_01] |
| Class Name |
| PutWithPathParamsAndBody |
| Testcase Input |
| testCaseName=ESignet_UpdateOIDCClientV3_with_arrayOfValues_purposeType_Neg, endPoint=/v1/esignet/client-mgmt/client/{clientId}, role=partner, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "status": "ACTIVE", "clientName": "MOSIP OIDC Client", "logoUri": "https://health-services.com/logo.png", "clientId": "$ID:CreateOIDCClientV3_all_Valid_Smoke_sid_clientId$", "redirectUris": "$IDPREDIRECTURI$", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{acrValues: "mosip:idp:acr:static-code"},{acrValues: "mosip:idp:acr:generated-code"},{acrValues: "mosip:idp:acr:biometrics"}], "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt", "keyLang1": "$1STLANG$", "clientNameLang": "MOSIP OIDC Client", "userinfo_response_type": "JWS", "purpose_title": "title", "purpose_type": ["verify", "link", "login"], "purpose_subTitle": "subtitle", "signup_banner_required": true, "forgot_pwd_link_required": true, "consent_expire_in_mins": 30 }, output={ "errors": [ { "errorCode": "invalid_additional_config" } ] }, inputTemplate=esignet/UpdateOIDCClientV3/UpdateOIDCClient, outputTemplate=esignet/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=To update OIDC Client V3 with array of values as purpose type, uniqueIdentifier=TC_ESignet_UpdateOIDCClientV3_21, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_UpdateOIDCClientV3_with_emptyStringValue_purposeType_Neg |
| Testcase Dependency |
| [TC_ESignet_CreateOIDCClientV3_01] |
| Class Name |
| PutWithPathParamsAndBody |
| Testcase Input |
| testCaseName=ESignet_UpdateOIDCClientV3_with_emptyStringValue_purposeType_Neg, endPoint=/v1/esignet/client-mgmt/client/{clientId}, role=partner, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "status": "ACTIVE", "clientName": "MOSIP OIDC Client", "logoUri": "https://health-services.com/logo.png", "clientId": "$ID:CreateOIDCClientV3_all_Valid_Smoke_sid_clientId$", "redirectUris": "$IDPREDIRECTURI$", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{acrValues: "mosip:idp:acr:static-code"},{acrValues: "mosip:idp:acr:generated-code"},{acrValues: "mosip:idp:acr:biometrics"}], "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt", "keyLang1": "$1STLANG$", "clientNameLang": "MOSIP OIDC Client", "userinfo_response_type": "JWS", "purpose_title": "title", "purpose_type": " ", "purpose_subTitle": "subtitle", "signup_banner_required": true, "forgot_pwd_link_required": true, "consent_expire_in_mins": 30 }, output={ "errors": [ { "errorCode": "invalid_additional_config" } ] }, inputTemplate=esignet/UpdateOIDCClientV3/UpdateOIDCClient, outputTemplate=esignet/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=To update OIDC Client V3 with empty string value as purpose type, uniqueIdentifier=TC_ESignet_UpdateOIDCClientV3_20, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_UpdateOIDCClientV3_with_empty_purposeType_Neg |
| Testcase Dependency |
| [TC_ESignet_CreateOIDCClientV3_01] |
| Class Name |
| PutWithPathParamsAndBody |
| Testcase Input |
| testCaseName=ESignet_UpdateOIDCClientV3_with_empty_purposeType_Neg, endPoint=/v1/esignet/client-mgmt/client/{clientId}, role=partner, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "status": "ACTIVE", "clientName": "MOSIP OIDC Client", "logoUri": "https://health-services.com/logo.png", "clientId": "$ID:CreateOIDCClientV3_all_Valid_Smoke_sid_clientId$", "redirectUris": "$IDPREDIRECTURI$", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{acrValues: "mosip:idp:acr:static-code"},{acrValues: "mosip:idp:acr:generated-code"},{acrValues: "mosip:idp:acr:biometrics"}], "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt", "keyLang1": "$1STLANG$", "clientNameLang": "MOSIP OIDC Client", "userinfo_response_type": "JWS", "purpose_title": "title", "purpose_type": "", "purpose_subTitle": "subtitle", "signup_banner_required": true, "forgot_pwd_link_required": true, "consent_expire_in_mins": 30 }, output={ "errors": [ { "errorCode": "invalid_additional_config" } ] }, inputTemplate=esignet/UpdateOIDCClientV3/UpdateOIDCClient, outputTemplate=esignet/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=To update OIDC Client V3 with empty purpose type, uniqueIdentifier=TC_ESignet_UpdateOIDCClientV3_19, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_UpdateOIDCClientV3_with_empty_stringValueAs_subtitle_Smoke |
| Testcase Dependency |
| [TC_ESignet_CreateOIDCClientV3_01] |
| Class Name |
| PutWithPathParamsAndBody |
| Testcase Input |
| testCaseName=ESignet_UpdateOIDCClientV3_with_empty_stringValueAs_subtitle_Smoke, endPoint=/v1/esignet/client-mgmt/client/{clientId}, role=partner, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "status": "ACTIVE", "clientName": "MOSIP OIDC Client", "logoUri": "https://health-services.com/logo.png", "clientId": "$ID:CreateOIDCClientV3_all_Valid_Smoke_sid_clientId$", "redirectUris": "$IDPREDIRECTURI$", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{acrValues: "mosip:idp:acr:static-code"},{acrValues: "mosip:idp:acr:generated-code"},{acrValues: "mosip:idp:acr:biometrics"}], "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt", "keyLang1": "$1STLANG$", "clientNameLang": "MOSIP OIDC Client", "userinfo_response_type": "JWS", "purpose_title": "title", "purpose_type": "verify", "purpose_subTitle": " ", "signup_banner_required": true, "forgot_pwd_link_required": true, "consent_expire_in_mins": 30 }, output={ "status": "ACTIVE" }, inputTemplate=esignet/UpdateOIDCClientV3/UpdateOIDCClient, outputTemplate=esignet/UpdateOIDCClientV3/UpdateOIDCClientResult, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=To update OIDC Client V3 with empty string value as subtitle, uniqueIdentifier=TC_ESignet_UpdateOIDCClientV3_14, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_UpdateOIDCClientV3_with_empty_stringValueAs_title_Smoke |
| Testcase Dependency |
| [TC_ESignet_CreateOIDCClientV3_01] |
| Class Name |
| PutWithPathParamsAndBody |
| Testcase Input |
| testCaseName=ESignet_UpdateOIDCClientV3_with_empty_stringValueAs_title_Smoke, endPoint=/v1/esignet/client-mgmt/client/{clientId}, role=partner, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "status": "ACTIVE", "clientName": "MOSIP OIDC Client", "logoUri": "https://health-services.com/logo.png", "clientId": "$ID:CreateOIDCClientV3_all_Valid_Smoke_sid_clientId$", "redirectUris": "$IDPREDIRECTURI$", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{acrValues: "mosip:idp:acr:static-code"},{acrValues: "mosip:idp:acr:generated-code"},{acrValues: "mosip:idp:acr:biometrics"}], "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt", "keyLang1": "$1STLANG$", "clientNameLang": "MOSIP OIDC Client", "userinfo_response_type": "JWS", "purpose_title": " ", "purpose_type": "verify", "purpose_subTitle": "subtitle", "signup_banner_required": true, "forgot_pwd_link_required": true, "consent_expire_in_mins": 30 }, output={ "status": "ACTIVE" }, inputTemplate=esignet/UpdateOIDCClientV3/UpdateOIDCClient, outputTemplate=esignet/UpdateOIDCClientV3/UpdateOIDCClientResult, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=To update OIDC Client V3 with empty string value as title, uniqueIdentifier=TC_ESignet_UpdateOIDCClientV3_13, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_UpdateOIDCClientV3_with_empty_subtitle_Smoke |
| Testcase Dependency |
| [TC_ESignet_CreateOIDCClientV3_01] |
| Class Name |
| PutWithPathParamsAndBody |
| Testcase Input |
| testCaseName=ESignet_UpdateOIDCClientV3_with_empty_subtitle_Smoke, endPoint=/v1/esignet/client-mgmt/client/{clientId}, role=partner, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "status": "ACTIVE", "clientName": "MOSIP OIDC Client", "logoUri": "https://health-services.com/logo.png", "clientId": "$ID:CreateOIDCClientV3_all_Valid_Smoke_sid_clientId$", "redirectUris": "$IDPREDIRECTURI$", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{acrValues: "mosip:idp:acr:static-code"},{acrValues: "mosip:idp:acr:generated-code"},{acrValues: "mosip:idp:acr:biometrics"}], "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt", "keyLang1": "$1STLANG$", "clientNameLang": "MOSIP OIDC Client", "userinfo_response_type": "JWS", "purpose_title": "title", "purpose_type": "verify", "purpose_subTitle": "", "signup_banner_required": true, "forgot_pwd_link_required": true, "consent_expire_in_mins": 30 }, output={ "status": "ACTIVE" }, inputTemplate=esignet/UpdateOIDCClientV3/UpdateOIDCClient, outputTemplate=esignet/UpdateOIDCClientV3/UpdateOIDCClientResult, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=To update OIDC Client V3 with empty subtitle, uniqueIdentifier=TC_ESignet_UpdateOIDCClientV3_12, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_UpdateOIDCClientV3_with_empty_title_Smoke |
| Testcase Dependency |
| [TC_ESignet_CreateOIDCClientV3_01] |
| Class Name |
| PutWithPathParamsAndBody |
| Testcase Input |
| testCaseName=ESignet_UpdateOIDCClientV3_with_empty_title_Smoke, endPoint=/v1/esignet/client-mgmt/client/{clientId}, role=partner, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "status": "ACTIVE", "clientName": "MOSIP OIDC Client", "logoUri": "https://health-services.com/logo.png", "clientId": "$ID:CreateOIDCClientV3_all_Valid_Smoke_sid_clientId$", "redirectUris": "$IDPREDIRECTURI$", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{acrValues: "mosip:idp:acr:static-code"},{acrValues: "mosip:idp:acr:generated-code"},{acrValues: "mosip:idp:acr:biometrics"}], "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt", "keyLang1": "$1STLANG$", "clientNameLang": "MOSIP OIDC Client", "userinfo_response_type": "JWS", "purpose_title": "", "purpose_type": "verify", "purpose_subTitle": "subtitle", "signup_banner_required": true, "forgot_pwd_link_required": true, "consent_expire_in_mins": 30 }, output={ "status": "ACTIVE" }, inputTemplate=esignet/UpdateOIDCClientV3/UpdateOIDCClient, outputTemplate=esignet/UpdateOIDCClientV3/UpdateOIDCClientResult, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=To update OIDC Client V3 with empty title, uniqueIdentifier=TC_ESignet_UpdateOIDCClientV3_11, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_UpdateOIDCClientV3_with_false_forgot_pwd_link_required_Smoke |
| Testcase Dependency |
| [TC_ESignet_CreateOIDCClientV3_01] |
| Class Name |
| PutWithPathParamsAndBody |
| Testcase Input |
| testCaseName=ESignet_UpdateOIDCClientV3_with_false_forgot_pwd_link_required_Smoke, endPoint=/v1/esignet/client-mgmt/client/{clientId}, role=partner, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "status": "ACTIVE", "clientName": "MOSIP OIDC Client", "logoUri": "https://health-services.com/logo.png", "clientId": "$ID:CreateOIDCClientV3_all_Valid_Smoke_sid_clientId$", "redirectUris": "$IDPREDIRECTURI$", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{acrValues: "mosip:idp:acr:static-code"},{acrValues: "mosip:idp:acr:generated-code"},{acrValues: "mosip:idp:acr:biometrics"}], "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt", "keyLang1": "$1STLANG$", "clientNameLang": "MOSIP OIDC Client", "userinfo_response_type": "JWS", "purpose_title": "title", "purpose_type": "verify", "purpose_subTitle": "subtitle", "signup_banner_required": true, "forgot_pwd_link_required": false, "consent_expire_in_mins": 30 }, output={ "status": "ACTIVE" }, inputTemplate=esignet/UpdateOIDCClientV3/UpdateOIDCClient, outputTemplate=esignet/UpdateOIDCClientV3/UpdateOIDCClientResult, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=To update OIDC Client V3 with false as forgot_pwd_link_required field value, uniqueIdentifier=TC_ESignet_UpdateOIDCClientV3_24, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_UpdateOIDCClientV3_with_false_signup_banner_required_Smoke |
| Testcase Dependency |
| [TC_ESignet_CreateOIDCClientV3_01] |
| Class Name |
| PutWithPathParamsAndBody |
| Testcase Input |
| testCaseName=ESignet_UpdateOIDCClientV3_with_false_signup_banner_required_Smoke, endPoint=/v1/esignet/client-mgmt/client/{clientId}, role=partner, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "status": "ACTIVE", "clientName": "MOSIP OIDC Client", "logoUri": "https://health-services.com/logo.png", "clientId": "$ID:CreateOIDCClientV3_all_Valid_Smoke_sid_clientId$", "redirectUris": "$IDPREDIRECTURI$", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{acrValues: "mosip:idp:acr:static-code"},{acrValues: "mosip:idp:acr:generated-code"},{acrValues: "mosip:idp:acr:biometrics"}], "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt", "keyLang1": "$1STLANG$", "clientNameLang": "MOSIP OIDC Client", "userinfo_response_type": "JWS", "purpose_title": "title", "purpose_type": "verify", "purpose_subTitle": "subtitle", "signup_banner_required": false, "forgot_pwd_link_required": true, "consent_expire_in_mins": 30 }, output={ "status": "ACTIVE" }, inputTemplate=esignet/UpdateOIDCClientV3/UpdateOIDCClient, outputTemplate=esignet/UpdateOIDCClientV3/UpdateOIDCClientResult, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=To update OIDC Client V3 with false as signup_banner_required field, uniqueIdentifier=TC_ESignet_UpdateOIDCClientV3_22, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_UpdateOIDCClientV3_with_invalid_consent_expire_in_mins_Value_Neg |
| Testcase Dependency |
| [TC_ESignet_CreateOIDCClientV3_01] |
| Class Name |
| PutWithPathParamsAndBody |
| Testcase Input |
| testCaseName=ESignet_UpdateOIDCClientV3_with_invalid_consent_expire_in_mins_Value_Neg, endPoint=/v1/esignet/client-mgmt/client/{clientId}, role=partner, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "status": "ACTIVE", "clientName": "MOSIP OIDC Client", "logoUri": "https://health-services.com/logo.png", "clientId": "$ID:CreateOIDCClientV3_all_Valid_Smoke_sid_clientId$", "redirectUris": "$IDPREDIRECTURI$", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{acrValues: "mosip:idp:acr:static-code"},{acrValues: "mosip:idp:acr:generated-code"},{acrValues: "mosip:idp:acr:biometrics"}], "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt", "keyLang1": "$1STLANG$", "clientNameLang": "MOSIP OIDC Client", "userinfo_response_type": "JWS", "purpose_title": "title", "purpose_type": "verify", "purpose_subTitle": "subtitle", "signup_banner_required": true, "forgot_pwd_link_required": true, "consent_expire_in_mins": 302asw }, output={ "errors": [ { "errorCode": "invalid_additional_config" } ] }, inputTemplate=esignet/UpdateOIDCClientV3/UpdateOIDCClient, outputTemplate=esignet/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=To update OIDC Client V3 with invalid consent_expire_in_mins field value, uniqueIdentifier=TC_ESignet_UpdateOIDCClientV3_26, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_UpdateOIDCClientV3_with_invalid_forgot_pwd_link_required_Neg |
| Testcase Dependency |
| [TC_ESignet_CreateOIDCClientV3_01] |
| Class Name |
| PutWithPathParamsAndBody |
| Testcase Input |
| testCaseName=ESignet_UpdateOIDCClientV3_with_invalid_forgot_pwd_link_required_Neg, endPoint=/v1/esignet/client-mgmt/client/{clientId}, role=partner, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "status": "ACTIVE", "clientName": "MOSIP OIDC Client", "logoUri": "https://health-services.com/logo.png", "clientId": "$ID:CreateOIDCClientV3_all_Valid_Smoke_sid_clientId$", "redirectUris": "$IDPREDIRECTURI$", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{acrValues: "mosip:idp:acr:static-code"},{acrValues: "mosip:idp:acr:generated-code"},{acrValues: "mosip:idp:acr:biometrics"}], "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt", "keyLang1": "$1STLANG$", "clientNameLang": "MOSIP OIDC Client", "userinfo_response_type": "JWS", "purpose_title": "title", "purpose_type": "verify", "purpose_subTitle": "subtitle", "signup_banner_required": true, "forgot_pwd_link_required": yesnoyes, "consent_expire_in_mins": 30 }, output={ "errors": [ { "errorCode": "invalid_additional_config" } ] }, inputTemplate=esignet/UpdateOIDCClientV3/UpdateOIDCClient, outputTemplate=esignet/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=To update OIDC Client V3 with invalid forgot_pwd_link_required field value, uniqueIdentifier=TC_ESignet_UpdateOIDCClientV3_25, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_UpdateOIDCClientV3_with_invalid_purposeType_Neg |
| Testcase Dependency |
| [TC_ESignet_CreateOIDCClientV3_01] |
| Class Name |
| PutWithPathParamsAndBody |
| Testcase Input |
| testCaseName=ESignet_UpdateOIDCClientV3_with_invalid_purposeType_Neg, endPoint=/v1/esignet/client-mgmt/client/{clientId}, role=partner, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "status": "ACTIVE", "clientName": "MOSIP OIDC Client", "logoUri": "https://health-services.com/logo.png", "clientId": "$ID:CreateOIDCClientV3_all_Valid_Smoke_sid_clientId$", "redirectUris": "$IDPREDIRECTURI$", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{acrValues: "mosip:idp:acr:static-code"},{acrValues: "mosip:idp:acr:generated-code"},{acrValues: "mosip:idp:acr:biometrics"}], "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt", "keyLang1": "$1STLANG$", "clientNameLang": "MOSIP OIDC Client", "userinfo_response_type": "JWS", "purpose_title": "title", "purpose_type": "abcdfejtklsdjd", "purpose_subTitle": "subtitle", "signup_banner_required": true, "forgot_pwd_link_required": true, "consent_expire_in_mins": 30 }, output={ "errors": [ { "errorCode": "invalid_additional_config" } ] }, inputTemplate=esignet/UpdateOIDCClientV3/UpdateOIDCClient, outputTemplate=esignet/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=To update OIDC Client V3 with invalid purpose type, uniqueIdentifier=TC_ESignet_UpdateOIDCClientV3_18, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_UpdateOIDCClientV3_with_invalid_signup_banner_required_Neg |
| Testcase Dependency |
| [TC_ESignet_CreateOIDCClientV3_01] |
| Class Name |
| PutWithPathParamsAndBody |
| Testcase Input |
| testCaseName=ESignet_UpdateOIDCClientV3_with_invalid_signup_banner_required_Neg, endPoint=/v1/esignet/client-mgmt/client/{clientId}, role=partner, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "status": "ACTIVE", "clientName": "MOSIP OIDC Client", "logoUri": "https://health-services.com/logo.png", "clientId": "$ID:CreateOIDCClientV3_all_Valid_Smoke_sid_clientId$", "redirectUris": "$IDPREDIRECTURI$", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{acrValues: "mosip:idp:acr:static-code"},{acrValues: "mosip:idp:acr:generated-code"},{acrValues: "mosip:idp:acr:biometrics"}], "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt", "keyLang1": "$1STLANG$", "clientNameLang": "MOSIP OIDC Client", "userinfo_response_type": "JWS", "purpose_title": "title", "purpose_type": "verify", "purpose_subTitle": "subtitle", "signup_banner_required": yesno, "forgot_pwd_link_required": true, "consent_expire_in_mins": 30 }, output={ "errors": [ { "errorCode": "invalid_additional_config" } ] }, inputTemplate=esignet/UpdateOIDCClientV3/UpdateOIDCClient, outputTemplate=esignet/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=To update OIDC Client V3 with invalid signup_banner_required field value, uniqueIdentifier=TC_ESignet_UpdateOIDCClientV3_23, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_UpdateOIDCClientV3_with_link_purposeType_Smoke |
| Testcase Dependency |
| [TC_ESignet_CreateOIDCClientV3_01] |
| Class Name |
| PutWithPathParamsAndBody |
| Testcase Input |
| testCaseName=ESignet_UpdateOIDCClientV3_with_link_purposeType_Smoke, endPoint=/v1/esignet/client-mgmt/client/{clientId}, role=partner, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "status": "ACTIVE", "clientName": "MOSIP OIDC Client", "logoUri": "https://health-services.com/logo.png", "clientId": "$ID:CreateOIDCClientV3_all_Valid_Smoke_sid_clientId$", "redirectUris": "$IDPREDIRECTURI$", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{acrValues: "mosip:idp:acr:static-code"},{acrValues: "mosip:idp:acr:generated-code"},{acrValues: "mosip:idp:acr:biometrics"}], "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt", "keyLang1": "$1STLANG$", "clientNameLang": "MOSIP OIDC Client", "userinfo_response_type": "JWS", "purpose_title": "title", "purpose_type": "link", "purpose_subTitle": "subtitle", "signup_banner_required": true, "forgot_pwd_link_required": true, "consent_expire_in_mins": 30 }, output={ "status": "ACTIVE" }, inputTemplate=esignet/UpdateOIDCClientV3/UpdateOIDCClient, outputTemplate=esignet/UpdateOIDCClientV3/UpdateOIDCClientResult, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=To update OIDC Client V3 with link as a purpose type, uniqueIdentifier=TC_ESignet_UpdateOIDCClientV3_16, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_UpdateOIDCClientV3_with_login_purposeType_Smoke |
| Testcase Dependency |
| [TC_ESignet_CreateOIDCClientV3_01] |
| Class Name |
| PutWithPathParamsAndBody |
| Testcase Input |
| testCaseName=ESignet_UpdateOIDCClientV3_with_login_purposeType_Smoke, endPoint=/v1/esignet/client-mgmt/client/{clientId}, role=partner, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "status": "ACTIVE", "clientName": "MOSIP OIDC Client", "logoUri": "https://health-services.com/logo.png", "clientId": "$ID:CreateOIDCClientV3_all_Valid_Smoke_sid_clientId$", "redirectUris": "$IDPREDIRECTURI$", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{acrValues: "mosip:idp:acr:static-code"},{acrValues: "mosip:idp:acr:generated-code"},{acrValues: "mosip:idp:acr:biometrics"}], "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt", "keyLang1": "$1STLANG$", "clientNameLang": "MOSIP OIDC Client", "userinfo_response_type": "JWS", "purpose_title": "title", "purpose_type": "login", "purpose_subTitle": "subtitle", "signup_banner_required": true, "forgot_pwd_link_required": true, "consent_expire_in_mins": 30 }, output={ "status": "ACTIVE" }, inputTemplate=esignet/UpdateOIDCClientV3/UpdateOIDCClient, outputTemplate=esignet/UpdateOIDCClientV3/UpdateOIDCClientResult, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=To update OIDC Client V3 with login as a purpose type, uniqueIdentifier=TC_ESignet_UpdateOIDCClientV3_17, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_UpdateOIDCClientV3_with_valid_subtitle_Smoke |
| Testcase Dependency |
| [TC_ESignet_CreateOIDCClientV3_01] |
| Class Name |
| PutWithPathParamsAndBody |
| Testcase Input |
| testCaseName=ESignet_UpdateOIDCClientV3_with_valid_subtitle_Smoke, endPoint=/v1/esignet/client-mgmt/client/{clientId}, role=partner, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "status": "ACTIVE", "clientName": "MOSIP OIDC Client", "logoUri": "https://health-services.com/logo.png", "clientId": "$ID:CreateOIDCClientV3_all_Valid_Smoke_sid_clientId$", "redirectUris": "$IDPREDIRECTURI$", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{acrValues: "mosip:idp:acr:static-code"},{acrValues: "mosip:idp:acr:generated-code"},{acrValues: "mosip:idp:acr:biometrics"}], "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt", "keyLang1": "$1STLANG$", "clientNameLang": "MOSIP OIDC Client", "userinfo_response_type": "JWS", "purpose_title": "Login using eSignet", "purpose_type": "verify", "purpose_subTitle": "Conn and Sons is requesting authentication for login", "signup_banner_required": true, "forgot_pwd_link_required": true, "consent_expire_in_mins": 30 }, output={ "status": "ACTIVE" }, inputTemplate=esignet/UpdateOIDCClientV3/UpdateOIDCClient, outputTemplate=esignet/UpdateOIDCClientV3/UpdateOIDCClientResult, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=To update OIDC Client V3 with valid subtitle, uniqueIdentifier=TC_ESignet_UpdateOIDCClientV3_10, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_UpdateOIDCClientV3_with_valid_title_Smoke |
| Testcase Dependency |
| [TC_ESignet_CreateOIDCClientV3_01] |
| Class Name |
| PutWithPathParamsAndBody |
| Testcase Input |
| testCaseName=ESignet_UpdateOIDCClientV3_with_valid_title_Smoke, endPoint=/v1/esignet/client-mgmt/client/{clientId}, role=partner, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "status": "ACTIVE", "clientName": "MOSIP OIDC Client", "logoUri": "https://health-services.com/logo.png", "clientId": "$ID:CreateOIDCClientV3_all_Valid_Smoke_sid_clientId$", "redirectUris": "$IDPREDIRECTURI$", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{acrValues: "mosip:idp:acr:static-code"},{acrValues: "mosip:idp:acr:generated-code"},{acrValues: "mosip:idp:acr:biometrics"}], "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt", "keyLang1": "$1STLANG$", "clientNameLang": "MOSIP OIDC Client", "userinfo_response_type": "JWS", "purpose_title": "Login using eSignet", "purpose_type": "verify", "purpose_subTitle": "subtitle", "signup_banner_required": true, "forgot_pwd_link_required": true, "consent_expire_in_mins": 30 }, output={ "status": "ACTIVE" }, inputTemplate=esignet/UpdateOIDCClientV3/UpdateOIDCClient, outputTemplate=esignet/UpdateOIDCClientV3/UpdateOIDCClientResult, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=To update OIDC Client V3 with valid title, uniqueIdentifier=TC_ESignet_UpdateOIDCClientV3_09, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_UpdateOIDCClientV3_without_purpose_type_Neg |
| Testcase Dependency |
| [TC_ESignet_CreateOIDCClientV3_01] |
| Class Name |
| PutWithPathParamsAndBody |
| Testcase Input |
| testCaseName=ESignet_UpdateOIDCClientV3_without_purpose_type_Neg, endPoint=/v1/esignet/client-mgmt/client/{clientId}, role=partner, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "status": "ACTIVE", "clientName": "MOSIP OIDC Client", "logoUri": "https://health-services.com/logo.png", "clientId": "$ID:CreateOIDCClientV3_all_Valid_Smoke_sid_clientId$", "redirectUris": "$IDPREDIRECTURI$", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{acrValues: "mosip:idp:acr:static-code"},{acrValues: "mosip:idp:acr:generated-code"},{acrValues: "mosip:idp:acr:biometrics"}], "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt", "keyLang1": "$1STLANG$", "clientNameLang": "MOSIP OIDC Client", "userinfo_response_type": "JWS", "purpose_title": "title", "purpose_subTitle": "subtitle", "signup_banner_required": true, "forgot_pwd_link_required": true, "consent_expire_in_mins": 30 }, output={ "errors": [ { "errorCode": "invalid_additional_config" } ] }, inputTemplate=esignet/UpdateOIDCClientV3/UpdateOIDCClient, outputTemplate=esignet/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=To update OIDC Client V3 without purpose type, uniqueIdentifier=TC_ESignet_UpdateOIDCClientV3_15, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_UpdateOIDCClientV3_MOSIPID_all_ForJWSUpdatedToJWEInfo_Valid_Smoke |
| Testcase Dependency |
| [TC_ESignet_CreateOIDCClientV3_01] |
| Class Name |
| PutWithPathParamsAndBody |
| Testcase Input |
| testCaseName=ESignet_UpdateOIDCClientV3_MOSIPID_all_ForJWSUpdatedToJWEInfo_Valid_Smoke, endPoint=/v1/esignet/client-mgmt/client/{clientId}, role=partner, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "status": "ACTIVE", "clientName": "MOSIP OIDC Client", "logoUri": "https://health-services.com/logo.png", "clientId": "$ID:CreateOIDCClient_all_ForJWSUpdatedToJWEInfo_Valid_Smoke_sid_clientId$", "redirectUris": "$IDPREDIRECTURI$", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{acrValues: "mosip:idp:acr:static-code"},{acrValues: "mosip:idp:acr:generated-code"},{acrValues: "mosip:idp:acr:biometrics"}], "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt", "keyLang1": "$1STLANG$", "clientNameLang": "MOSIP OIDC Client", "userinfo_response_type": "JWE", "purpose_title": "title", "purpose_type": "verify", "purpose_subTitle": "subtitle", "signup_banner_required": true, "forgot_pwd_link_required": true, "consent_expire_in_mins": 30 }, output={ "status": "ACTIVE" }, inputTemplate=esignet/EndToEndFlowWithV3/UpdateClientV3/UpdateOIDCClient, outputTemplate=esignet/EndToEndFlowWithV3/UpdateClientV3/UpdateOIDCClientResult, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=To update OIDC Client V3 with all valid data, uniqueIdentifier=TC_ESignet_UpdateOIDCClientV3_03, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:218)
at io.mosip.testrig.apirig.esignet.testscripts.PutWithPathParamsAndBody.test(PutWithPathParamsAndBody.java:86)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_UpdateOIDCClientV3_MOSIPID_all_userinfoJWE_Valid_Smoke |
| Testcase Dependency |
| [] |
| Class Name |
| PutWithPathParamsAndBody |
| Testcase Input |
| testCaseName=ESignet_UpdateOIDCClientV3_MOSIPID_all_userinfoJWE_Valid_Smoke, endPoint=/v1/esignet/client-mgmt/client/{clientId}, role=partner, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "status": "ACTIVE", "clientName": "MOSIP OIDC Client", "logoUri": "https://health-services.com/logo.png", "clientId": "$ID:CreateOIDCClient_all_forUserInfoJWE_Valid_Smoke_sid_clientId$", "redirectUris": "$IDPREDIRECTURI$", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{acrValues: "mosip:idp:acr:static-code"},{acrValues: "mosip:idp:acr:generated-code"},{acrValues: "mosip:idp:acr:biometrics"}], "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt", "keyLang1": "$1STLANG$", "clientNameLang": "MOSIP OIDC Client", "userinfo_response_type": "JWE", "purpose_title": "title", "purpose_type": "verify", "purpose_subTitle": "subtitle", "signup_banner_required": true, "forgot_pwd_link_required": true, "consent_expire_in_mins": 30 }, output={ "status": "ACTIVE" }, inputTemplate=esignet/EndToEndFlowWithV3/UpdateClientV3/UpdateOIDCClient, outputTemplate=esignet/EndToEndFlowWithV3/UpdateClientV3/UpdateOIDCClientResult, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=To update OIDC Client V3 with all valid data, uniqueIdentifier=TC_ESignet_UpdateOIDCClientV3_02, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:218)
at io.mosip.testrig.apirig.esignet.testscripts.PutWithPathParamsAndBody.test(PutWithPathParamsAndBody.java:86)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_UpdateOIDCClientV3_MOSIPID_all_userinfo_Valid_Smoke |
| Testcase Dependency |
| [TC_ESignet_CreateOIDCClientV3_01] |
| Class Name |
| PutWithPathParamsAndBody |
| Testcase Input |
| testCaseName=ESignet_UpdateOIDCClientV3_MOSIPID_all_userinfo_Valid_Smoke, endPoint=/v1/esignet/client-mgmt/client/{clientId}, role=partner, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "status": "ACTIVE", "clientName": "MOSIP OIDC Client", "logoUri": "https://health-services.com/logo.png", "clientId": "$ID:CreateOIDCClient_all_forUserInfoJWS_Valid_Smoke_sid_clientId$", "redirectUris": "$IDPREDIRECTURI$", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{acrValues: "mosip:idp:acr:static-code"},{acrValues: "mosip:idp:acr:generated-code"},{acrValues: "mosip:idp:acr:biometrics"}], "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt", "keyLang1": "$1STLANG$", "clientNameLang": "MOSIP OIDC Client", "userinfo_response_type": "JWS", "purpose_title": "title", "purpose_type": "verify", "purpose_subTitle": "subtitle", "signup_banner_required": true, "forgot_pwd_link_required": true, "consent_expire_in_mins": 30 }, output={ "status": "ACTIVE" }, inputTemplate=esignet/EndToEndFlowWithV3/UpdateClientV3/UpdateOIDCClient, outputTemplate=esignet/EndToEndFlowWithV3/UpdateClientV3/UpdateOIDCClientResult, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=To update OIDC Client V3 with all valid data, uniqueIdentifier=TC_ESignet_UpdateOIDCClientV3_01, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:218)
at io.mosip.testrig.apirig.esignet.testscripts.PutWithPathParamsAndBody.test(PutWithPathParamsAndBody.java:86)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_OAuthDetailsRequest_V3_MOSIPID_AuthToken_Xsrf_uin_all_Valid_ForJWSUpdatedToJWEInfo_Smoke_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_OAuthDetailsRequest_V3_MOSIPID_AuthToken_Xsrf_uin_all_Valid_ForJWSUpdatedToJWEInfo_Smoke_sid, endPoint=/v1/esignet/authorization/v3/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_ForJWSUpdatedToJWEInfo_Valid_Smoke_sid_clientId$", "scope": "openid profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:generated-code", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "urlInfo1724138417665", "claimsLocales": "en", "uiLocales": "en-US" }, output={ }, inputTemplate=esignet/EndToEndFlowWithV3/OAuthDetailsRequestV3/OAuthDetailsRequest, outputTemplate=esignet/EndToEndFlowWithV3/OAuthDetailsRequestV3/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Get OAuth details with claims as prerequisite, uniqueIdentifier=TC_Signup_ESignet_OAuthDetailsRequestV3_Prerequisite, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:218)
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:93)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_OAuthDetailsRequest_V3_MOSIPID_AuthToken_Xsrf_uin_all_Valid_for_userInfoJWE_Smoke_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_OAuthDetailsRequest_V3_MOSIPID_AuthToken_Xsrf_uin_all_Valid_for_userInfoJWE_Smoke_sid, endPoint=/v1/esignet/authorization/v3/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_forUserInfoJWE_Valid_Smoke_sid_clientId$", "scope": "openid profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:generated-code", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "urlInfo1724138417665", "claimsLocales": "en", "uiLocales": "en-US" }, output={ }, inputTemplate=esignet/EndToEndFlowWithV3/OAuthDetailsRequestV3/OAuthDetailsRequest, outputTemplate=esignet/EndToEndFlowWithV3/OAuthDetailsRequestV3/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Get OAuth details with claims as prerequisite, uniqueIdentifier=TC_Signup_ESignet_OAuthDetailsRequestV3_Prerequisite, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:218)
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:93)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_OAuthDetailsRequest_V3_MOSIPID_AuthToken_Xsrf_uin_all_Valid_for_userInfo_Smoke_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_OAuthDetailsRequest_V3_MOSIPID_AuthToken_Xsrf_uin_all_Valid_for_userInfo_Smoke_sid, endPoint=/v1/esignet/authorization/v3/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_forUserInfoJWS_Valid_Smoke_sid_clientId$", "scope": "openid profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:generated-code", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "urlInfo1724138417665", "claimsLocales": "en", "uiLocales": "en-US" }, output={ }, inputTemplate=esignet/EndToEndFlowWithV3/OAuthDetailsRequestV3/OAuthDetailsRequest, outputTemplate=esignet/EndToEndFlowWithV3/OAuthDetailsRequestV3/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Get OAuth details with claims as prerequisite, uniqueIdentifier=TC_Signup_ESignet_OAuthDetailsRequestV3_Prerequisite, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:218)
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:93)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_AuthenticateUser_V3_MOSIPID_AuthToken_Xsrf__uin_Otp_Valid_ForJWSUpdatedToJWEInfo_Smoke |
| Testcase Dependency |
| [] |
| Class Name |
| PostWithAutogenIdWithOtpGenerate |
| Testcase Input |
| testCaseName=ESignet_AuthenticateUser_V3_MOSIPID_AuthToken_Xsrf__uin_Otp_Valid_ForJWSUpdatedToJWEInfo_Smoke, endPoint=/v1/esignet/authorization/v3/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_V3_MOSIPID_AuthToken_Xsrf_uin_all_Valid_ForJWSUpdatedToJWEInfo_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_V3_MOSIPID_AuthToken_Xsrf_uin_all_Valid_ForJWSUpdatedToJWEInfo_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_L2_Valid_Parameters_forUserInfoUpdatedJWE_smoke_Pos_UIN$", "authFactorType" : "OTP", "challenge" : "$ID:AddIdentity_L2_Valid_Parameters_forUserInfoUpdatedJWE_smoke_Pos_EMAIL$", "sendOtp":{ "encodedHash": "$ID:OAuthDetailsRequest_V3_MOSIPID_AuthToken_Xsrf_uin_all_Valid_ForJWSUpdatedToJWEInfo_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_V3_MOSIPID_AuthToken_Xsrf_uin_all_Valid_ForJWSUpdatedToJWEInfo_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_L2_Valid_Parameters_forUserInfoUpdatedJWE_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendOtp/SendOtp", "sendOtpEndPoint": "/v1/esignet/authorization/send-otp" } }, output={ "sendOtpResp":{ "sendOtpResTemplate":"signup/SendOtp/SendOtpResult" } }, inputTemplate=esignet/EndToEndFlowWithV3/AuthenticateUserV3/AuthenticateUser, outputTemplate=esignet/EndToEndFlowWithV3/AuthenticateUserV3/AuthenticateUserResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=null, uniqueIdentifier=null, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:218)
at io.mosip.testrig.apirig.esignet.testscripts.PostWithAutogenIdWithOtpGenerate.test(PostWithAutogenIdWithOtpGenerate.java:89)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_AuthenticateUser_V3_MOSIPID_AuthToken_Xsrf__uin_Otp_Valid_forUserInfoJWE_Smoke |
| Testcase Dependency |
| [] |
| Class Name |
| PostWithAutogenIdWithOtpGenerate |
| Testcase Input |
| testCaseName=ESignet_AuthenticateUser_V3_MOSIPID_AuthToken_Xsrf__uin_Otp_Valid_forUserInfoJWE_Smoke, endPoint=/v1/esignet/authorization/v3/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_V3_MOSIPID_AuthToken_Xsrf_uin_all_Valid_for_userInfoJWE_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_V3_MOSIPID_AuthToken_Xsrf_uin_all_Valid_for_userInfoJWE_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_L2_Valid_Parameters_forUserInfoJWE_smoke_Pos_UIN$", "authFactorType" : "OTP", "challenge" : "$ID:AddIdentity_L2_Valid_Parameters_forUserInfoJWE_smoke_Pos_EMAIL$", "sendOtp":{ "encodedHash": "$ID:OAuthDetailsRequest_V3_MOSIPID_AuthToken_Xsrf_uin_all_Valid_for_userInfoJWE_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_V3_MOSIPID_AuthToken_Xsrf_uin_all_Valid_for_userInfoJWE_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_L2_Valid_Parameters_forUserInfoJWE_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendOtp/SendOtp", "sendOtpEndPoint": "/v1/esignet/authorization/send-otp" } }, output={ "sendOtpResp":{ "sendOtpResTemplate":"signup/SendOtp/SendOtpResult" } }, inputTemplate=esignet/EndToEndFlowWithV3/AuthenticateUserV3/AuthenticateUser, outputTemplate=esignet/EndToEndFlowWithV3/AuthenticateUserV3/AuthenticateUserResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=null, uniqueIdentifier=null, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:218)
at io.mosip.testrig.apirig.esignet.testscripts.PostWithAutogenIdWithOtpGenerate.test(PostWithAutogenIdWithOtpGenerate.java:89)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_AuthenticateUser_V3_MOSIPID_AuthToken_Xsrf__uin_Otp_Valid_forUserInfo_Smoke |
| Testcase Dependency |
| [] |
| Class Name |
| PostWithAutogenIdWithOtpGenerate |
| Testcase Input |
| testCaseName=ESignet_AuthenticateUser_V3_MOSIPID_AuthToken_Xsrf__uin_Otp_Valid_forUserInfo_Smoke, endPoint=/v1/esignet/authorization/v3/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_V3_MOSIPID_AuthToken_Xsrf_uin_all_Valid_for_userInfo_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_V3_MOSIPID_AuthToken_Xsrf_uin_all_Valid_for_userInfo_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_L2_Valid_Parameters_forUserInfo_smoke_Pos_UIN$", "authFactorType" : "OTP", "challenge" : "$ID:AddIdentity_L2_Valid_Parameters_forUserInfo_smoke_Pos_EMAIL$", "sendOtp":{ "encodedHash": "$ID:OAuthDetailsRequest_V3_MOSIPID_AuthToken_Xsrf_uin_all_Valid_for_userInfo_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_V3_MOSIPID_AuthToken_Xsrf_uin_all_Valid_for_userInfo_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_L2_Valid_Parameters_forUserInfo_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendOtp/SendOtp", "sendOtpEndPoint": "/v1/esignet/authorization/send-otp" } }, output={ "sendOtpResp":{ "sendOtpResTemplate":"signup/SendOtp/SendOtpResult" } }, inputTemplate=esignet/EndToEndFlowWithV3/AuthenticateUserV3/AuthenticateUser, outputTemplate=esignet/EndToEndFlowWithV3/AuthenticateUserV3/AuthenticateUserResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=null, uniqueIdentifier=null, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:218)
at io.mosip.testrig.apirig.esignet.testscripts.PostWithAutogenIdWithOtpGenerate.test(PostWithAutogenIdWithOtpGenerate.java:89)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_AuthorizationCode_MOSIPID_uin_All_Valid_ForJWSUpdatedToJWEInfo_Smoke_sid |
| Testcase Dependency |
| [TC_ESignet_OAuthDetailsRequest_01, TC_ESignet_CreateOIDCClient_01] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_AuthorizationCode_MOSIPID_uin_All_Valid_ForJWSUpdatedToJWEInfo_Smoke_sid, endPoint=/v1/esignet/authorization/auth-code, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_V3_MOSIPID_AuthToken_Xsrf_uin_all_Valid_ForJWSUpdatedToJWEInfo_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_V3_MOSIPID_AuthToken_Xsrf_uin_all_Valid_ForJWSUpdatedToJWEInfo_Smoke_sid_transactionId$", "acceptedClaims": [{claim: "phone_number"},{claim: "email"}] }, output={ }, inputTemplate=esignet/EndToEndFlowWithV3/AuthorizeCode/AuthorizationCode, outputTemplate=esignet/EndToEndFlowWithV3/AuthorizeCode/AuthorizationCodeResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Authorization code request for end to end flow, uniqueIdentifier=TC_ESignet_AuthorizationCode_03, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:218)
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:93)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_AuthorizationCode_MOSIPID_uin_All_Valid_forUserInfoJWE_Smoke_sid |
| Testcase Dependency |
| [TC_ESignet_OAuthDetailsRequest_01, TC_ESignet_CreateOIDCClient_01] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_AuthorizationCode_MOSIPID_uin_All_Valid_forUserInfoJWE_Smoke_sid, endPoint=/v1/esignet/authorization/auth-code, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_V3_MOSIPID_AuthToken_Xsrf_uin_all_Valid_for_userInfoJWE_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_V3_MOSIPID_AuthToken_Xsrf_uin_all_Valid_for_userInfoJWE_Smoke_sid_transactionId$", "acceptedClaims": [{claim: "phone_number"},{claim: "email"}] }, output={ }, inputTemplate=esignet/EndToEndFlowWithV3/AuthorizeCode/AuthorizationCode, outputTemplate=esignet/EndToEndFlowWithV3/AuthorizeCode/AuthorizationCodeResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Authorization code request for end to end flow, uniqueIdentifier=TC_ESignet_AuthorizationCode_02, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:218)
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:93)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_AuthorizationCode_MOSIPID_uin_All_Valid_forUserInfo_Smoke_sid |
| Testcase Dependency |
| [TC_ESignet_OAuthDetailsRequest_01, TC_ESignet_CreateOIDCClient_01] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_AuthorizationCode_MOSIPID_uin_All_Valid_forUserInfo_Smoke_sid, endPoint=/v1/esignet/authorization/auth-code, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_V3_MOSIPID_AuthToken_Xsrf_uin_all_Valid_for_userInfo_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_V3_MOSIPID_AuthToken_Xsrf_uin_all_Valid_for_userInfo_Smoke_sid_transactionId$", "acceptedClaims": [{claim: "phone_number"},{claim: "email"}] }, output={ }, inputTemplate=esignet/EndToEndFlowWithV3/AuthorizeCode/AuthorizationCode, outputTemplate=esignet/EndToEndFlowWithV3/AuthorizeCode/AuthorizationCodeResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Authorization code request for end to end flow, uniqueIdentifier=TC_ESignet_AuthorizationCode_01, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:218)
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:93)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_GenerateToken_MOSIPID_uin_Valid_ForJWSUpdatedToJWEInfo_Smoke_sid |
| Testcase Dependency |
| [TC_ESignet_AuthorizationCode_01, TC_ESignet_OAuthDetailsRequest_01, TC_ESignet_CreateOIDCClient_01] |
| Class Name |
| SimplePostForAutoGenIdForUrlEncoded |
| Testcase Input |
| testCaseName=ESignet_GenerateToken_MOSIPID_uin_Valid_ForJWSUpdatedToJWEInfo_Smoke_sid, endPoint=$GETENDPOINTFROMWELLKNOWN$, role=resident, templateFields=null, input={ "grant_type": "authorization_code", "code": "$ID:AuthorizationCode_MOSIPID_uin_All_Valid_ForJWSUpdatedToJWEInfo_Smoke_sid_code$", "client_id": "$ID:CreateOIDCClient_all_ForJWSUpdatedToJWEInfo_Valid_Smoke_sid_clientId$", "client_assertion_type": "urn:ietf:params:oauth:client-assertion-type:jwt-bearer", "client_assertion": "$CLIENT_ASSERTION_USER6_JWK$", "redirect_uri": "$IDPREDIRECTURI$" }, output={ "token_type": "Bearer" }, inputTemplate=esignet/EndToEndFlowWithV3/GenerateToken/GenerateToken, outputTemplate=esignet/EndToEndFlowWithV3/GenerateToken/GenerateTokenResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generate token with all valid details UIN for user info, uniqueIdentifier=TC_ESignet_GenerateToken_03, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:218)
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenIdForUrlEncoded.test(SimplePostForAutoGenIdForUrlEncoded.java:88)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_GenerateToken_MOSIPID_uin_Valid_forUserInfoJWE_Smoke_sid |
| Testcase Dependency |
| [TC_ESignet_AuthorizationCode_01, TC_ESignet_OAuthDetailsRequest_01, TC_ESignet_CreateOIDCClient_01] |
| Class Name |
| SimplePostForAutoGenIdForUrlEncoded |
| Testcase Input |
| testCaseName=ESignet_GenerateToken_MOSIPID_uin_Valid_forUserInfoJWE_Smoke_sid, endPoint=$GETENDPOINTFROMWELLKNOWN$, role=resident, templateFields=null, input={ "grant_type": "authorization_code", "code": "$ID:AuthorizationCode_MOSIPID_uin_All_Valid_forUserInfoJWE_Smoke_sid_code$", "client_id": "$ID:CreateOIDCClient_all_forUserInfoJWE_Valid_Smoke_sid_clientId$", "client_assertion_type": "urn:ietf:params:oauth:client-assertion-type:jwt-bearer", "client_assertion": "$CLIENT_ASSERTION_USER4_JWK$", "redirect_uri": "$IDPREDIRECTURI$" }, output={ "token_type": "Bearer" }, inputTemplate=esignet/EndToEndFlowWithV3/GenerateToken/GenerateToken, outputTemplate=esignet/EndToEndFlowWithV3/GenerateToken/GenerateTokenResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generate token with all valid details UIN for user info, uniqueIdentifier=TC_ESignet_GenerateToken_02, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:218)
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenIdForUrlEncoded.test(SimplePostForAutoGenIdForUrlEncoded.java:88)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_GenerateToken_MOSIPID_uin_Valid_forUserInfo_Smoke_sid |
| Testcase Dependency |
| [TC_ESignet_AuthorizationCode_01, TC_ESignet_OAuthDetailsRequest_01, TC_ESignet_CreateOIDCClient_01] |
| Class Name |
| SimplePostForAutoGenIdForUrlEncoded |
| Testcase Input |
| testCaseName=ESignet_GenerateToken_MOSIPID_uin_Valid_forUserInfo_Smoke_sid, endPoint=$GETENDPOINTFROMWELLKNOWN$, role=resident, templateFields=null, input={ "grant_type": "authorization_code", "code": "$ID:AuthorizationCode_MOSIPID_uin_All_Valid_forUserInfo_Smoke_sid_code$", "client_id": "$ID:CreateOIDCClient_all_forUserInfoJWS_Valid_Smoke_sid_clientId$", "client_assertion_type": "urn:ietf:params:oauth:client-assertion-type:jwt-bearer", "client_assertion": "$CLIENT_ASSERTION_USER7_JWK$", "redirect_uri": "$IDPREDIRECTURI$" }, output={ "token_type": "Bearer" }, inputTemplate=esignet/EndToEndFlowWithV3/GenerateToken/GenerateToken, outputTemplate=esignet/EndToEndFlowWithV3/GenerateToken/GenerateTokenResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generate token with all valid details UIN for user info, uniqueIdentifier=TC_ESignet_GenerateToken_01, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:218)
at io.mosip.testrig.apirig.esignet.testscripts.SimplePostForAutoGenIdForUrlEncoded.test(SimplePostForAutoGenIdForUrlEncoded.java:88)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_GetOidcUserInfo_MOSIPID_uin_IdpAccessToken_StatusCode_ForJWSUpdatedToJWEInfo_Valid_Smoke |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=ESignet_GetOidcUserInfo_MOSIPID_uin_IdpAccessToken_StatusCode_ForJWSUpdatedToJWEInfo_Valid_Smoke, endPoint=/v1/esignet/oidc/userinfo, role=resident, templateFields=null, input={ "idpAccessToken": "$ID:GenerateToken_MOSIPID_uin_Valid_ForJWSUpdatedToJWEInfo_Smoke_sid_access_token$" }, output=200, inputTemplate=esignet/EndToEndFlowWithV3/UserInfo/GetOidcUserInfo, outputTemplate=esignet/EndToEndFlowWithV3/UserInfo/GetOidcUserInfoResult, restMethod=get, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Get OIDC user info with all valid details UIN, uniqueIdentifier=TC_ESignet_GetOidcUserInfoForV3_03, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:218)
at io.mosip.testrig.apirig.esignet.testscripts.GetWithParam.test(GetWithParam.java:87)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_GetOidcUserInfo_MOSIPID_uin_IdpAccessToken_StatusCode_forJWEInfo_Valid_Smoke |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=ESignet_GetOidcUserInfo_MOSIPID_uin_IdpAccessToken_StatusCode_forJWEInfo_Valid_Smoke, endPoint=/v1/esignet/oidc/userinfo, role=resident, templateFields=null, input={ "idpAccessToken": "$ID:GenerateToken_MOSIPID_uin_Valid_forUserInfoJWE_Smoke_sid_access_token$" }, output=200, inputTemplate=esignet/EndToEndFlowWithV3/UserInfo/GetOidcUserInfo, outputTemplate=esignet/EndToEndFlowWithV3/UserInfo/GetOidcUserInfoResult, restMethod=get, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Get OIDC user info with all valid details UIN, uniqueIdentifier=TC_ESignet_GetOidcUserInfoForV3_02, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:218)
at io.mosip.testrig.apirig.esignet.testscripts.GetWithParam.test(GetWithParam.java:87)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_GetOidcUserInfo_MOSIPID_uin_IdpAccessToken_StatusCode_forJWSInfo_Valid_Smoke |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=ESignet_GetOidcUserInfo_MOSIPID_uin_IdpAccessToken_StatusCode_forJWSInfo_Valid_Smoke, endPoint=/v1/esignet/oidc/userinfo, role=resident, templateFields=null, input={ "idpAccessToken": "$ID:GenerateToken_MOSIPID_uin_Valid_forUserInfo_Smoke_sid_access_token$" }, output=200, inputTemplate=esignet/EndToEndFlowWithV3/UserInfo/GetOidcUserInfo, outputTemplate=esignet/EndToEndFlowWithV3/UserInfo/GetOidcUserInfoResult, restMethod=get, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Get OIDC user info with all valid details UIN, uniqueIdentifier=TC_ESignet_GetOidcUserInfoForV3_01, additionalDependencies=null |
| Output Validation Exception |
org.testng.SkipException: feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.esignet.utils.EsignetUtil.isTestCaseValidForExecution(EsignetUtil.java:218)
at io.mosip.testrig.apirig.esignet.testscripts.GetWithParam.test(GetWithParam.java:87)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:281)
at io.mosip.testrig.apirig.esignet.testrunner.MosipTestRunner.main(MosipTestRunner.java:191)
... Removed 23 stack frames |
| Testcase Name |
|---|
| ESignet_CreateOIDCClientV3_MOCK_all_Valid_forUserInfoJWE_Smoke_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_CreateOIDCClientV3_MOCK_all_Valid_forUserInfoJWE_Smoke_sid, endPoint=/v1/esignet/client-mgmt/client, role=partner, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$RANDOMPARTNERID$", "clientName": "MOSIP OIDC Client", "logoUri": "https://health-services.com/logo.png", "relyingPartyId": "Bharathi-Inc", "redirectUris": "$IDPREDIRECTURI$", "publicKey": "$OIDCJWKKEY8$", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{"acrValues": "mosip:idp:acr:static-code"},{"acrValues": "mosip:idp:acr:generated-code"},{"acrValues": "mosip:idp:acr:biometrics"}], "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt", "keyLang1": "$1STLANG$", "clientNameLang": "MOSIP OIDC Client", "userinfo_response_type": "JWE", "purpose_title": "title", "purpose_type": "verify", "purpose_subTitle": "subtitle", "signup_banner_required": true, "forgot_pwd_link_required": true, "consent_expire_in_mins": 30 }, output={ "status": "ACTIVE" }, inputTemplate=esignet/EndToEndFlowWithV3MOCK/CreateClient/CreateOIDCClient, outputTemplate=esignet/EndToEndFlowWithV3MOCK/CreateClient/CreateOIDCClientResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=To create OIDC Client V3 with all valid data with JWE, uniqueIdentifier=TC_ESignet_OIDCClientV3_02, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_CreateOIDCClientV3_MOCK_all_Valid_forUserInfoToUpdateClient_Smoke_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_CreateOIDCClientV3_MOCK_all_Valid_forUserInfoToUpdateClient_Smoke_sid, endPoint=/v1/esignet/client-mgmt/client, role=partner, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$RANDOMPARTNERID$", "clientName": "MOSIP OIDC Client", "logoUri": "https://health-services.com/logo.png", "relyingPartyId": "Bharathi-Inc", "redirectUris": "$IDPREDIRECTURI$", "publicKey": "$OIDCJWKKEY9$", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{"acrValues": "mosip:idp:acr:static-code"},{"acrValues": "mosip:idp:acr:generated-code"},{"acrValues": "mosip:idp:acr:biometrics"}], "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt", "keyLang1": "$1STLANG$", "clientNameLang": "MOSIP OIDC Client", "userinfo_response_type": "JWS", "purpose_title": "title", "purpose_type": "verify", "purpose_subTitle": "subtitle", "signup_banner_required": true, "forgot_pwd_link_required": true, "consent_expire_in_mins": 30 }, output={ "status": "ACTIVE" }, inputTemplate=esignet/EndToEndFlowWithV3MOCK/CreateClient/CreateOIDCClient, outputTemplate=esignet/EndToEndFlowWithV3MOCK/CreateClient/CreateOIDCClientResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=To create OIDC Client V3 with all valid data with JWS, uniqueIdentifier=TC_ESignet_OIDCClientV3_03, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_CreateOIDCClientV3_MOCK_all_Valid_forUserInfo_Smoke_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_CreateOIDCClientV3_MOCK_all_Valid_forUserInfo_Smoke_sid, endPoint=/v1/esignet/client-mgmt/client, role=partner, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$RANDOMPARTNERID$", "clientName": "MOSIP OIDC Client", "logoUri": "https://health-services.com/logo.png", "relyingPartyId": "Bharathi-Inc", "redirectUris": "$IDPREDIRECTURI$", "publicKey": "$OIDCJWKKEY5$", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{"acrValues": "mosip:idp:acr:static-code"},{"acrValues": "mosip:idp:acr:generated-code"},{"acrValues": "mosip:idp:acr:biometrics"}], "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt", "keyLang1": "$1STLANG$", "clientNameLang": "MOSIP OIDC Client", "userinfo_response_type": "JWS", "purpose_title": "title", "purpose_type": "verify", "purpose_subTitle": "subtitle", "signup_banner_required": true, "forgot_pwd_link_required": true, "consent_expire_in_mins": 30 }, output={ "status": "ACTIVE" }, inputTemplate=esignet/EndToEndFlowWithV3MOCK/CreateClient/CreateOIDCClient, outputTemplate=esignet/EndToEndFlowWithV3MOCK/CreateClient/CreateOIDCClientResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=To create OIDC Client V3 with all valid data with JWS, uniqueIdentifier=TC_ESignet_OIDCClientV3_01, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_UpdateOIDCClientV3_MOCK_all_Valid_Smoke |
| Testcase Dependency |
| [TC_ESignet_CreateOIDCClientV3_01] |
| Class Name |
| PutWithPathParamsAndBody |
| Testcase Input |
| testCaseName=ESignet_UpdateOIDCClientV3_MOCK_all_Valid_Smoke, endPoint=/v1/esignet/client-mgmt/client/{clientId}, role=partner, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "status": "ACTIVE", "clientName": "MOSIP OIDC Client", "logoUri": "https://health-services.com/logo.png", "clientId": "$ID:CreateOIDCClientV3_MOCK_all_Valid_forUserInfoToUpdateClient_Smoke_sid_clientId$", "redirectUris": "$IDPREDIRECTURI$", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{acrValues: "mosip:idp:acr:static-code"},{acrValues: "mosip:idp:acr:generated-code"},{acrValues: "mosip:idp:acr:biometrics"}], "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt", "keyLang1": "$1STLANG$", "clientNameLang": "MOSIP OIDC Client", "userinfo_response_type": "JWE", "purpose_title": "title", "purpose_type": "verify", "purpose_subTitle": "subtitle", "signup_banner_required": true, "forgot_pwd_link_required": true, "consent_expire_in_mins": 30 }, output={ "status": "ACTIVE" }, inputTemplate=esignet/EndToEndFlowWithV3MOCK/UpdateClient/UpdateOIDCClient, outputTemplate=esignet/EndToEndFlowWithV3MOCK/UpdateClient/UpdateOIDCClientResult, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=To update OIDC Client V3 with all valid data, uniqueIdentifier=TC_ESignet_UpdateOIDCClientV3_01, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_OAuthDetailsRequest_V3_MOCK_AuthToken_Xsrf_uin_all_Valid_for_userInfoJWE_Smoke_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_OAuthDetailsRequest_V3_MOCK_AuthToken_Xsrf_uin_all_Valid_for_userInfoJWE_Smoke_sid, endPoint=/v1/esignet/authorization/v3/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClientV3_MOCK_all_Valid_forUserInfoJWE_Smoke_sid_clientId$", "scope": "openid profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:generated-code", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "urlInfo1724138417665", "claimsLocales": "en", "uiLocales": "en-US" }, output={ }, inputTemplate=esignet/EndToEndFlowWithV3MOCK/OAuthDetails/OAuthDetailsRequest, outputTemplate=esignet/EndToEndFlowWithV3MOCK/OAuthDetails/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Get OAuth details with claims as prerequisite, uniqueIdentifier=TC_Signup_ESignet_OAuthDetailsRequestV3_Prerequisite, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_OAuthDetailsRequest_V3_MOCK_AuthToken_Xsrf_uin_all_Valid_for_userInfoUpdatedClientJWE_Smoke_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_OAuthDetailsRequest_V3_MOCK_AuthToken_Xsrf_uin_all_Valid_for_userInfoUpdatedClientJWE_Smoke_sid, endPoint=/v1/esignet/authorization/v3/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClientV3_MOCK_all_Valid_forUserInfoToUpdateClient_Smoke_sid_clientId$", "scope": "openid profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:generated-code", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "urlInfo1724138417665", "claimsLocales": "en", "uiLocales": "en-US" }, output={ }, inputTemplate=esignet/EndToEndFlowWithV3MOCK/OAuthDetails/OAuthDetailsRequest, outputTemplate=esignet/EndToEndFlowWithV3MOCK/OAuthDetails/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Get OAuth details with claims as prerequisite, uniqueIdentifier=TC_Signup_ESignet_OAuthDetailsRequestV3_Prerequisite, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_OAuthDetailsRequest_V3_MOCK_AuthToken_Xsrf_uin_all_Valid_for_userInfo_Smoke_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_OAuthDetailsRequest_V3_MOCK_AuthToken_Xsrf_uin_all_Valid_for_userInfo_Smoke_sid, endPoint=/v1/esignet/authorization/v3/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClientV3_MOCK_all_Valid_forUserInfo_Smoke_sid_clientId$", "scope": "openid profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:generated-code", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "urlInfo1724138417665", "claimsLocales": "en", "uiLocales": "en-US" }, output={ }, inputTemplate=esignet/EndToEndFlowWithV3MOCK/OAuthDetails/OAuthDetailsRequest, outputTemplate=esignet/EndToEndFlowWithV3MOCK/OAuthDetails/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Get OAuth details with claims as prerequisite, uniqueIdentifier=TC_Signup_ESignet_OAuthDetailsRequestV3_Prerequisite, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_AuthenticateUser_V3_MOCK_AuthToken_Xsrf__uin_Otp_Valid_forUserInfoJWE_Smoke |
| Testcase Dependency |
| [] |
| Class Name |
| PostWithAutogenIdWithOtpGenerate |
| Testcase Input |
| testCaseName=ESignet_AuthenticateUser_V3_MOCK_AuthToken_Xsrf__uin_Otp_Valid_forUserInfoJWE_Smoke, endPoint=/v1/esignet/authorization/v3/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_V3_MOCK_AuthToken_Xsrf_uin_all_Valid_for_userInfoJWE_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_V3_MOCK_AuthToken_Xsrf_uin_all_Valid_for_userInfoJWE_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_L2_Valid_Parameters_forUserInfoJWE_smoke_Pos_UIN$", "authFactorType" : "OTP", "challenge" : "$ID:AddIdentity_L2_Valid_Parameters_forUserInfoJWE_smoke_Pos_EMAIL$", "sendOtp":{ "encodedHash": "$ID:OAuthDetailsRequest_V3_MOCK_AuthToken_Xsrf_uin_all_Valid_for_userInfoJWE_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_V3_MOCK_AuthToken_Xsrf_uin_all_Valid_for_userInfoJWE_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_L2_Valid_Parameters_forUserInfoJWE_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendOtp/SendOtp", "sendOtpEndPoint": "/v1/esignet/authorization/send-otp" } }, output={ "sendOtpResp":{ "sendOtpResTemplate":"signup/SendOtp/SendOtpResult" } }, inputTemplate=esignet/EndToEndFlowWithV3MOCK/Authenticate/AuthenticateUser, outputTemplate=esignet/EndToEndFlowWithV3MOCK/Authenticate/AuthenticateUserResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=null, uniqueIdentifier=null, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_AuthenticateUser_V3_MOCK_AuthToken_Xsrf__uin_Otp_Valid_forUserInfoUpdatedJWE_Smoke |
| Testcase Dependency |
| [] |
| Class Name |
| PostWithAutogenIdWithOtpGenerate |
| Testcase Input |
| testCaseName=ESignet_AuthenticateUser_V3_MOCK_AuthToken_Xsrf__uin_Otp_Valid_forUserInfoUpdatedJWE_Smoke, endPoint=/v1/esignet/authorization/v3/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_V3_MOCK_AuthToken_Xsrf_uin_all_Valid_for_userInfoUpdatedClientJWE_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_V3_MOCK_AuthToken_Xsrf_uin_all_Valid_for_userInfoUpdatedClientJWE_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_L2_Valid_Parameters_forUserInfoUpdatedJWE_smoke_Pos_UIN$", "authFactorType" : "OTP", "challenge" : "$ID:AddIdentity_L2_Valid_Parameters_forUserInfoUpdatedJWE_smoke_Pos_EMAIL$", "sendOtp":{ "encodedHash": "$ID:OAuthDetailsRequest_V3_MOCK_AuthToken_Xsrf_uin_all_Valid_for_userInfoUpdatedClientJWE_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_V3_MOCK_AuthToken_Xsrf_uin_all_Valid_for_userInfoUpdatedClientJWE_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_L2_Valid_Parameters_forUserInfoUpdatedJWE_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendOtp/SendOtp", "sendOtpEndPoint": "/v1/esignet/authorization/send-otp" } }, output={ "sendOtpResp":{ "sendOtpResTemplate":"signup/SendOtp/SendOtpResult" } }, inputTemplate=esignet/EndToEndFlowWithV3MOCK/Authenticate/AuthenticateUser, outputTemplate=esignet/EndToEndFlowWithV3MOCK/Authenticate/AuthenticateUserResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=null, uniqueIdentifier=null, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_AuthenticateUser_V3_MOCK_AuthToken_Xsrf__uin_Otp_Valid_forUserInfo_Smoke |
| Testcase Dependency |
| [] |
| Class Name |
| PostWithAutogenIdWithOtpGenerate |
| Testcase Input |
| testCaseName=ESignet_AuthenticateUser_V3_MOCK_AuthToken_Xsrf__uin_Otp_Valid_forUserInfo_Smoke, endPoint=/v1/esignet/authorization/v3/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_V3_MOCK_AuthToken_Xsrf_uin_all_Valid_for_userInfo_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_V3_MOCK_AuthToken_Xsrf_uin_all_Valid_for_userInfo_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_L2_Valid_Parameters_forUserInfo_smoke_Pos_UIN$", "authFactorType" : "OTP", "challenge" : "$ID:AddIdentity_L2_Valid_Parameters_forUserInfo_smoke_Pos_EMAIL$", "sendOtp":{ "encodedHash": "$ID:OAuthDetailsRequest_V3_MOCK_AuthToken_Xsrf_uin_all_Valid_for_userInfo_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_V3_MOCK_AuthToken_Xsrf_uin_all_Valid_for_userInfo_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_L2_Valid_Parameters_forUserInfo_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendOtp/SendOtp", "sendOtpEndPoint": "/v1/esignet/authorization/send-otp" } }, output={ "sendOtpResp":{ "sendOtpResTemplate":"signup/SendOtp/SendOtpResult" } }, inputTemplate=esignet/EndToEndFlowWithV3MOCK/Authenticate/AuthenticateUser, outputTemplate=esignet/EndToEndFlowWithV3MOCK/Authenticate/AuthenticateUserResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=null, uniqueIdentifier=null, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_AuthorizationCode_MOCK_uin_All_Valid_forUserInfoJWE_Smoke_sid |
| Testcase Dependency |
| [TC_ESignet_OAuthDetailsRequest_01, TC_ESignet_CreateOIDCClient_01] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_AuthorizationCode_MOCK_uin_All_Valid_forUserInfoJWE_Smoke_sid, endPoint=/v1/esignet/authorization/auth-code, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_V3_MOCK_AuthToken_Xsrf_uin_all_Valid_for_userInfoJWE_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_V3_MOCK_AuthToken_Xsrf_uin_all_Valid_for_userInfoJWE_Smoke_sid_transactionId$", "acceptedClaims": [{claim: "phone_number"},{claim: "email"}] }, output={ }, inputTemplate=esignet/EndToEndFlowWithV3MOCK/AuthCode/AuthorizationCode, outputTemplate=esignet/EndToEndFlowWithV3MOCK/AuthCode/AuthorizationCodeResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Authorization code request for end to end flow JWE, uniqueIdentifier=TC_ESignet_AuthorizationCode_02, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_AuthorizationCode_MOCK_uin_All_Valid_forUserInfoUpdatedJWE_Smoke_sid |
| Testcase Dependency |
| [TC_ESignet_OAuthDetailsRequest_01, TC_ESignet_CreateOIDCClient_01] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_AuthorizationCode_MOCK_uin_All_Valid_forUserInfoUpdatedJWE_Smoke_sid, endPoint=/v1/esignet/authorization/auth-code, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_V3_MOCK_AuthToken_Xsrf_uin_all_Valid_for_userInfoUpdatedClientJWE_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_V3_MOCK_AuthToken_Xsrf_uin_all_Valid_for_userInfoUpdatedClientJWE_Smoke_sid_transactionId$", "acceptedClaims": [{claim: "phone_number"},{claim: "email"}] }, output={ }, inputTemplate=esignet/EndToEndFlowWithV3MOCK/AuthCode/AuthorizationCode, outputTemplate=esignet/EndToEndFlowWithV3MOCK/AuthCode/AuthorizationCodeResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Authorization code request for end to end flow JWE, uniqueIdentifier=TC_ESignet_AuthorizationCode_03, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_AuthorizationCode_MOCK_uin_All_Valid_forUserInfo_Smoke_sid |
| Testcase Dependency |
| [TC_ESignet_OAuthDetailsRequest_01, TC_ESignet_CreateOIDCClient_01] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_AuthorizationCode_MOCK_uin_All_Valid_forUserInfo_Smoke_sid, endPoint=/v1/esignet/authorization/auth-code, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_V3_MOCK_AuthToken_Xsrf_uin_all_Valid_for_userInfo_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_V3_MOCK_AuthToken_Xsrf_uin_all_Valid_for_userInfo_Smoke_sid_transactionId$", "acceptedClaims": [{claim: "phone_number"},{claim: "email"}] }, output={ }, inputTemplate=esignet/EndToEndFlowWithV3MOCK/AuthCode/AuthorizationCode, outputTemplate=esignet/EndToEndFlowWithV3MOCK/AuthCode/AuthorizationCodeResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Authorization code request for end to end flow, uniqueIdentifier=TC_ESignet_AuthorizationCode_01, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_GenerateToken_MOCK_uin_Valid_forUserInfoJWE_Smoke_sid |
| Testcase Dependency |
| [TC_ESignet_AuthorizationCode_01, TC_ESignet_OAuthDetailsRequest_01, TC_ESignet_CreateOIDCClient_01] |
| Class Name |
| SimplePostForAutoGenIdForUrlEncoded |
| Testcase Input |
| testCaseName=ESignet_GenerateToken_MOCK_uin_Valid_forUserInfoJWE_Smoke_sid, endPoint=$GETENDPOINTFROMWELLKNOWN$, role=resident, templateFields=null, input={ "grant_type": "authorization_code", "code": "$ID:AuthorizationCode_MOCK_uin_All_Valid_forUserInfoJWE_Smoke_sid_code$", "client_id": "$ID:CreateOIDCClientV3_MOCK_all_Valid_forUserInfoJWE_Smoke_sid_clientId$", "client_assertion_type": "urn:ietf:params:oauth:client-assertion-type:jwt-bearer", "client_assertion": "$CLIENT_ASSERTION_USER8_JWK$", "redirect_uri": "$IDPREDIRECTURI$" }, output={ "token_type": "Bearer" }, inputTemplate=esignet/EndToEndFlowWithV3MOCK/GenToken/GenerateToken, outputTemplate=esignet/EndToEndFlowWithV3MOCK/GenToken/GenerateTokenResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generate token with all valid details UIN for user info JWE, uniqueIdentifier=TC_ESignet_GenerateToken_02, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_GenerateToken_MOCK_uin_Valid_forUserInfoUpdatedJWE_Smoke_sid |
| Testcase Dependency |
| [TC_ESignet_AuthorizationCode_01, TC_ESignet_OAuthDetailsRequest_01, TC_ESignet_CreateOIDCClient_01] |
| Class Name |
| SimplePostForAutoGenIdForUrlEncoded |
| Testcase Input |
| testCaseName=ESignet_GenerateToken_MOCK_uin_Valid_forUserInfoUpdatedJWE_Smoke_sid, endPoint=$GETENDPOINTFROMWELLKNOWN$, role=resident, templateFields=null, input={ "grant_type": "authorization_code", "code": "$ID:AuthorizationCode_MOCK_uin_All_Valid_forUserInfoUpdatedJWE_Smoke_sid_code$", "client_id": "$ID:CreateOIDCClientV3_MOCK_all_Valid_forUserInfoToUpdateClient_Smoke_sid_clientId$", "client_assertion_type": "urn:ietf:params:oauth:client-assertion-type:jwt-bearer", "client_assertion": "$CLIENT_ASSERTION_USER9_JWK$", "redirect_uri": "$IDPREDIRECTURI$" }, output={ "token_type": "Bearer" }, inputTemplate=esignet/EndToEndFlowWithV3MOCK/GenToken/GenerateToken, outputTemplate=esignet/EndToEndFlowWithV3MOCK/GenToken/GenerateTokenResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generate token with all valid details UIN for user info JWE, uniqueIdentifier=TC_ESignet_GenerateToken_03, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_GenerateToken_MOCK_uin_Valid_forUserInfo_Smoke_sid |
| Testcase Dependency |
| [TC_ESignet_AuthorizationCode_01, TC_ESignet_OAuthDetailsRequest_01, TC_ESignet_CreateOIDCClient_01] |
| Class Name |
| SimplePostForAutoGenIdForUrlEncoded |
| Testcase Input |
| testCaseName=ESignet_GenerateToken_MOCK_uin_Valid_forUserInfo_Smoke_sid, endPoint=$GETENDPOINTFROMWELLKNOWN$, role=resident, templateFields=null, input={ "grant_type": "authorization_code", "code": "$ID:AuthorizationCode_MOCK_uin_All_Valid_forUserInfo_Smoke_sid_code$", "client_id": "$ID:CreateOIDCClientV3_MOCK_all_Valid_forUserInfo_Smoke_sid_clientId$", "client_assertion_type": "urn:ietf:params:oauth:client-assertion-type:jwt-bearer", "client_assertion": "$CLIENT_ASSERTION_USER5_JWK$", "redirect_uri": "$IDPREDIRECTURI$" }, output={ "token_type": "Bearer" }, inputTemplate=esignet/EndToEndFlowWithV3MOCK/GenToken/GenerateToken, outputTemplate=esignet/EndToEndFlowWithV3MOCK/GenToken/GenerateTokenResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generate token with all valid details UIN for user info, uniqueIdentifier=TC_ESignet_GenerateToken_01, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_GetOidcUserInfo_MOCK_uin_IdpAccessToken_StatusCode_forJWEInfo_Valid_Smoke |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=ESignet_GetOidcUserInfo_MOCK_uin_IdpAccessToken_StatusCode_forJWEInfo_Valid_Smoke, endPoint=/v1/esignet/oidc/userinfo, role=resident, templateFields=null, input={ "idpAccessToken": "$ID:GenerateToken_MOCK_uin_Valid_forUserInfoJWE_Smoke_sid_access_token$" }, output=200, inputTemplate=esignet/EndToEndFlowWithV3MOCK/userinfo/GetOidcUserInfo, outputTemplate=esignet/EndToEndFlowWithV3MOCK/userinfo/GetOidcUserInfoResult, restMethod=get, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Get OIDC user info with all valid details UIN, uniqueIdentifier=TC_ESignet_GetOidcUserInfoForV3_02, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_GetOidcUserInfo_MOCK_uin_IdpAccessToken_StatusCode_forJWSInfo_Valid_Smoke |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=ESignet_GetOidcUserInfo_MOCK_uin_IdpAccessToken_StatusCode_forJWSInfo_Valid_Smoke, endPoint=/v1/esignet/oidc/userinfo, role=resident, templateFields=null, input={ "idpAccessToken": "$ID:GenerateToken_MOCK_uin_Valid_forUserInfo_Smoke_sid_access_token$" }, output=200, inputTemplate=esignet/EndToEndFlowWithV3MOCK/userinfo/GetOidcUserInfo, outputTemplate=esignet/EndToEndFlowWithV3MOCK/userinfo/GetOidcUserInfoResult, restMethod=get, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Get OIDC user info with all valid details UIN, uniqueIdentifier=TC_ESignet_GetOidcUserInfoForV3_01, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_GetOidcUserInfo_MOCK_uin_IdpAccessToken_StatusCode_toUpdatedJWEInfo_Valid_Smoke |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=ESignet_GetOidcUserInfo_MOCK_uin_IdpAccessToken_StatusCode_toUpdatedJWEInfo_Valid_Smoke, endPoint=/v1/esignet/oidc/userinfo, role=resident, templateFields=null, input={ "idpAccessToken": "$ID:GenerateToken_MOCK_uin_Valid_forUserInfoUpdatedJWE_Smoke_sid_access_token$" }, output=200, inputTemplate=esignet/EndToEndFlowWithV3MOCK/userinfo/GetOidcUserInfo, outputTemplate=esignet/EndToEndFlowWithV3MOCK/userinfo/GetOidcUserInfoResult, restMethod=get, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Get OIDC user info with all valid details UIN, uniqueIdentifier=TC_ESignet_GetOidcUserInfoForV3_03, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_CreateOIDCClientV3PAR_all_Valid_Smoke_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_CreateOIDCClientV3PAR_all_Valid_Smoke_sid, endPoint=/v1/esignet/client-mgmt/client, role=partner, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$RANDOMPARTNERID$", "clientName": "MOSIP PAR OIDC Client", "logoUri": "https://health-services.com/logo.png", "relyingPartyId": "mock-relying-party-id", "redirectUris": "$IDPREDIRECTURI$", "publicKey": "$OIDC_JWK_KEY_PAR$", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{"acrValues": "mosip:idp:acr:static-code"},{"acrValues": "mosip:idp:acr:generated-code"},{"acrValues": "mosip:idp:acr:biometrics"}], "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt", "keyLang1": "$1STLANG$", "clientNameLang": "MOSIP PAR OIDC Client", "userinfo_response_type": "JWS", "purpose_title": "title", "purpose_type": "verify", "purpose_subTitle": "subtitle", "signup_banner_required": true, "forgot_pwd_link_required": true, "consent_expire_in_mins": 120, "require_pushed_authorization_requests": true }, output={ "status": "ACTIVE" }, inputTemplate=esignet/PAR/PARCreateOIDCClientV3/PARCreateOIDCClient, outputTemplate=esignet/PAR/PARCreateOIDCClientV3/PARCreateOIDCClientResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create of OIDC Client V3 with all valid data, uniqueIdentifier=TC_ESignet_PARCreateOIDCClientV3_01, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_OauthPar_Empty_State |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenIdForUrlEncoded |
| Testcase Input |
| testCaseName=ESignet_OauthPar_Empty_State, endPoint=/v1/esignet/oauth/par, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "client_id": "$ID:CreateOIDCClientV3PAR_all_Valid_Smoke_sid_clientId$", "scope": "openid profile", "response_type": "code", "redirect_uri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acr_values": "mosip:idp:acr:generated-code", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "$REMOVE$", "claim_locales": "en", "client_assertion_type": "urn:ietf:params:oauth:client-assertion-type:jwt-bearer", "client_assertion": "$CLIENT_ASSERTION_PAR_JWT$", "aud_key": "pushed_authorization_request_endpoint" }, output={ }, inputTemplate=esignet/PAR/OauthPar/OauthPar, outputTemplate=esignet/PAR/OauthPar/OauthParResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate successful PAR request with missing state, uniqueIdentifier=TC_ESignet_OauthPar_02, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_OauthPar_Missing_nonce |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenIdForUrlEncoded |
| Testcase Input |
| testCaseName=ESignet_OauthPar_Missing_nonce, endPoint=/v1/esignet/oauth/par, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "client_id": "$ID:CreateOIDCClientV3PAR_all_Valid_Smoke_sid_clientId$", "scope": "openid profile", "response_type": "code", "redirect_uri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acr_values": "mosip:idp:acr:generated-code", "nonce": "$REMOVE$", "state": "eree2311", "claim_locales": "en", "client_assertion_type": "urn:ietf:params:oauth:client-assertion-type:jwt-bearer", "client_assertion": "$CLIENT_ASSERTION_PAR_JWT$", "aud_key": "pushed_authorization_request_endpoint" }, output={ }, inputTemplate=esignet/PAR/OauthPar/OauthPar, outputTemplate=esignet/PAR/OauthPar/OauthParResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate successful PAR request with missing nonce state, uniqueIdentifier=TC_ESignet_OauthPar_03, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_OauthPar_Valid_ASCII_value |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenIdForUrlEncoded |
| Testcase Input |
| testCaseName=ESignet_OauthPar_Valid_ASCII_value, endPoint=/v1/esignet/oauth/par, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "client_id": "$ID:CreateOIDCClientV3PAR_all_Valid_Smoke_sid_clientId$", "scope": "openid profile", "response_type": "code", "redirect_uri": "$IDPREDIRECTURI$", "display": "page", "prompt": "login", "acr_values": "mosip:idp:acr:generated-code", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claim_locales": "en", "client_assertion_type": "urn:ietf:params:oauth:client-assertion-type:jwt-bearer", "client_assertion": "$CLIENT_ASSERTION_PAR_JWT$", "aud_key": "pushed_authorization_request_endpoint" }, output={ }, inputTemplate=esignet/PAR/OauthPar/OauthPar, outputTemplate=esignet/PAR/OauthPar/OauthParResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate successful PAR request with valid ASCII value, uniqueIdentifier=TC_ESignet_OauthPar_04, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_OauthPar_all_Valid_Smoke_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenIdForUrlEncoded |
| Testcase Input |
| testCaseName=ESignet_OauthPar_all_Valid_Smoke_sid, endPoint=/v1/esignet/oauth/par, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "client_id": "$ID:CreateOIDCClientV3PAR_all_Valid_Smoke_sid_clientId$", "scope": "openid profile", "response_type": "code", "redirect_uri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acr_values": "mosip:idp:acr:generated-code", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claim_locales": "en", "client_assertion_type": "urn:ietf:params:oauth:client-assertion-type:jwt-bearer", "client_assertion": "$CLIENT_ASSERTION_PAR_JWT$", "aud_key": "pushed_authorization_request_endpoint" }, output={ }, inputTemplate=esignet/PAR/OauthPar/OauthPar, outputTemplate=esignet/PAR/OauthPar/OauthParResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate successful PAR request with valid client details, uniqueIdentifier=TC_ESignet_OauthPar_01, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_OauthPar_unkown_acr_values |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenIdForUrlEncoded |
| Testcase Input |
| testCaseName=ESignet_OauthPar_unkown_acr_values, endPoint=/v1/esignet/oauth/par, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "client_id": "$ID:CreateOIDCClientV3PAR_all_Valid_Smoke_sid_clientId$", "scope": "openid profile", "response_type": "code", "redirect_uri": "$IDPREDIRECTURI$", "display": "page", "prompt": "login", "acr_values": "urn:mace:incommon:iap:password", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claim_locales": "en", "client_assertion_type": "urn:ietf:params:oauth:client-assertion-type:jwt-bearer", "client_assertion": "$CLIENT_ASSERTION_PAR_JWT$", "aud_key": "pushed_authorization_request_endpoint" }, output={ }, inputTemplate=esignet/PAR/OauthPar/OauthPar, outputTemplate=esignet/PAR/OauthPar/OauthParResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate successful PAR request with valid ASCII value, uniqueIdentifier=TC_ESignet_OauthPar_05, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_OauthPar_valid_JWT_values |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenIdForUrlEncoded |
| Testcase Input |
| testCaseName=ESignet_OauthPar_valid_JWT_values, endPoint=/v1/esignet/oauth/par, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "client_id": "$ID:CreateOIDCClientV3PAR_all_Valid_Smoke_sid_clientId$", "scope": "openid profile", "response_type": "code", "redirect_uri": "$IDPREDIRECTURI$", "display": "page", "prompt": "login", "acr_values": "urn:mace:incommon:iap:password", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claim_locales": "en", "client_assertion_type": "urn:ietf:params:oauth:client-assertion-type:jwt-bearer", "client_assertion": "$CLIENT_ASSERTION_PAR_JWT$", "aud_key": "pushed_authorization_request_endpoint" }, output={ }, inputTemplate=esignet/PAR/OauthPar/OauthPar, outputTemplate=esignet/PAR/OauthPar/OauthParResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate successful PAR request with valid JWT value, uniqueIdentifier=TC_ESignet_OauthPar_06, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_OAuthDetailsRequest_PAR_AuthToken_Xsrf_all_Valid_Smoke_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_OAuthDetailsRequest_PAR_AuthToken_Xsrf_all_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/par-oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "requestUri": "$ID:OauthPar_all_Valid_Smoke_sid_request_uri$", "clientId": "$ID:CreateOIDCClientV3PAR_all_Valid_Smoke_sid_clientId$" }, output={ }, inputTemplate=esignet/PAR/PAROauthDetails/PAROauthDetails, outputTemplate=esignet/PAR/PAROauthDetails/PAROauthDetailsResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate successful retrieval of OAuth details in PAR flow, uniqueIdentifier=TC_ESignet_PAROauthDetails_01, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_PARAuthenticateUserV3_AuthToken_Xsrf__uin_Otp_Valid_forUserInfo_Smoke |
| Testcase Dependency |
| [] |
| Class Name |
| PostWithAutogenIdWithOtpGenerate |
| Testcase Input |
| testCaseName=ESignet_PARAuthenticateUserV3_AuthToken_Xsrf__uin_Otp_Valid_forUserInfo_Smoke, endPoint=/v1/esignet/authorization/v3/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_PAR_AuthToken_Xsrf_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_PAR_AuthToken_Xsrf_all_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_For_PAR_smoke_Pos_UIN$", "authFactorType" : "OTP", "challenge" : "$ID:AddIdentity_For_PAR_smoke_Pos_EMAIL$", "sendOtp":{ "encodedHash": "$ID:OAuthDetailsRequest_PAR_AuthToken_Xsrf_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_PAR_AuthToken_Xsrf_all_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_For_PAR_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendOtp/SendOtp", "sendOtpEndPoint": "/v1/esignet/authorization/send-otp" } }, output={ "sendOtpResp":{ "sendOtpResTemplate":"esignet/SendOtp/SendOtpResult" } }, inputTemplate=esignet/PAR/PARAuthenticateUserV3/PARAuthenticateUserV3, outputTemplate=esignet/PAR/PARAuthenticateUserV3/PARAuthenticateUserV3Result, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Verify that the PARAuthenticateUserV3 endpoint authenticates the user successfully with valid credentials, uniqueIdentifier=TC_ESignet_PARAuthenticateUserV3_01, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_AuthorizationCode_PAR__AuthToken_Xsrf_All_Valid_forUserInfo_Smoke_sid |
| Testcase Dependency |
| [TC_ESignet_OAuthDetailsRequest_01, TC_ESignet_CreateOIDCClient_01] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_AuthorizationCode_PAR__AuthToken_Xsrf_All_Valid_forUserInfo_Smoke_sid, endPoint=/v1/esignet/authorization/auth-code, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_PAR_AuthToken_Xsrf_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_PAR_AuthToken_Xsrf_all_Valid_Smoke_sid_transactionId$", "acceptedClaims": [{claim: "phone_number"},{claim: "email"}] }, output={ }, inputTemplate=esignet/PAR/PARAuthorizationCode/PARAuthorizationCode, outputTemplate=esignet/PAR/PARAuthorizationCode/PARAuthorizationCodeResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate successful authorization code generation in PAR flow, uniqueIdentifier=TC_ESignet_AuthorizationCode_01, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_GenerateToken_PAR_Valid_Smoke_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenIdForUrlEncoded |
| Testcase Input |
| testCaseName=ESignet_GenerateToken_PAR_Valid_Smoke_sid, endPoint=$GETENDPOINTFROMWELLKNOWN$, role=resident, templateFields=null, input={ "grant_type": "authorization_code", "code": "$ID:AuthorizationCode_PAR__AuthToken_Xsrf_All_Valid_forUserInfo_Smoke_sid_code$", "client_id": "$ID:CreateOIDCClientV3PAR_all_Valid_Smoke_sid_clientId$", "client_assertion_type": "urn:ietf:params:oauth:client-assertion-type:jwt-bearer", "client_assertion": "$CLIENT_ASSERTION_PAR_JWT$", "redirect_uri": "$IDPREDIRECTURI$", "aud_key": "token_endpoint" }, output={ }, inputTemplate=esignet/PAR/PARGenerateToken/PARGenerateToken, outputTemplate=esignet/PAR/PARGenerateToken/PARGenerateTokenResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generate token with all valid details UIN for user info, uniqueIdentifier=TC_ESignet_PARGenerateToken_01, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_GetOidcUserInfo_PAR_UIN_IdpAccessToken_StatusCode_Valid_Smoke |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=ESignet_GetOidcUserInfo_PAR_UIN_IdpAccessToken_StatusCode_Valid_Smoke, endPoint=/v1/esignet/oidc/userinfo, role=resident, templateFields=null, input={ "idpAccessToken": "$ID:GenerateToken_PAR_Valid_Smoke_sid_access_token$" }, output=200, inputTemplate=esignet/PAR/PARGetUserInfo/PARGetUserInfo, outputTemplate=esignet/PAR/PARGetUserInfo/PARGetUserInfoResult, restMethod=get, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Get OIDC user info with all valid details UIN, uniqueIdentifier=TC_ESignet_PARGetUserInfo_01, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_OauthParNegativeScenarios_Invalid_Scope_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenIdForUrlEncoded |
| Testcase Input |
| testCaseName=ESignet_OauthParNegativeScenarios_Invalid_Scope_Neg, endPoint=/v1/esignet/oauth/par, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "client_id": "$ID:CreateOIDCClientV3PAR_all_Valid_Smoke_sid_clientId$", "scope": "7777", "response_type": "code", "redirect_uri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acr_values": "mosip:idp:acr:generated-code", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claim_locales": "en", "client_assertion_type": "urn:ietf:params:oauth:client-assertion-type:jwt-bearer", "client_assertion": "$CLIENT_ASSERTION_PAR_JWT$", "aud_key": "pushed_authorization_request_endpoint" }, output={ "error": "invalid_scope" }, inputTemplate=esignet/PAR/OauthParNegativeScenarios/OauthParNegativeScenarios, outputTemplate=esignet/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate successful PAR request with invalid Scope paramenter, uniqueIdentifier=TC_ESignet_OauthParNegativeScenarios_02, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_OauthParNegativeScenarios_Invalid_client_id_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenIdForUrlEncoded |
| Testcase Input |
| testCaseName=ESignet_OauthParNegativeScenarios_Invalid_client_id_Neg, endPoint=/v1/esignet/oauth/par, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "client_id": "esignet99999", "scope": "openid profile", "response_type": "code", "redirect_uri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acr_values": "mosip:idp:acr:generated-code", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claim_locales": "en", "client_assertion_type": "urn:ietf:params:oauth:client-assertion-type:jwt-bearer", "client_assertion": "$CLIENT_ASSERTION_PAR_JWT$", "aud_key": "pushed_authorization_request_endpoint" }, output={ "error": "invalid_request" }, inputTemplate=esignet/PAR/OauthParNegativeScenarios/OauthParNegativeScenarios, outputTemplate=esignet/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate successful PAR request with invalid client_id paramenter, uniqueIdentifier=TC_ESignet_OauthParNegativeScenarios_06, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_OauthParNegativeScenarios_Invalid_response_type_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenIdForUrlEncoded |
| Testcase Input |
| testCaseName=ESignet_OauthParNegativeScenarios_Invalid_response_type_Neg, endPoint=/v1/esignet/oauth/par, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "client_id": "$ID:CreateOIDCClientV3PAR_all_Valid_Smoke_sid_clientId$", "scope": "openid profile", "response_type": "code123", "redirect_uri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acr_values": "mosip:idp:acr:generated-code", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claim_locales": "en", "client_assertion_type": "urn:ietf:params:oauth:client-assertion-type:jwt-bearer", "client_assertion": "$CLIENT_ASSERTION_PAR_JWT$", "aud_key": "pushed_authorization_request_endpoint" }, output={ "error": "invalid_request" }, inputTemplate=esignet/PAR/OauthParNegativeScenarios/OauthParNegativeScenarios, outputTemplate=esignet/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate successful PAR request with invalid response_type paramenter, uniqueIdentifier=TC_ESignet_OauthParNegativeScenarios_04, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_OauthParNegativeScenarios_Missing_Scope_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenIdForUrlEncoded |
| Testcase Input |
| testCaseName=ESignet_OauthParNegativeScenarios_Missing_Scope_Neg, endPoint=/v1/esignet/oauth/par, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "client_id": "$ID:CreateOIDCClientV3_all_Valid_Smoke_sid_clientId$", "scope": "$REMOVE$", "response_type": "code", "redirect_uri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acr_values": "mosip:idp:acr:generated-code", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claim_locales": "en", "client_assertion_type": "urn:ietf:params:oauth:client-assertion-type:jwt-bearer", "client_assertion": "$CLIENT_ASSERTION_PAR_JWT$", "aud_key": "pushed_authorization_request_endpoint" }, output={ "error": "invalid_scope" }, inputTemplate=esignet/PAR/OauthParNegativeScenarios/OauthParNegativeScenarios, outputTemplate=esignet/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate successful PAR request with missing Scope paramenter, uniqueIdentifier=TC_ESignet_OauthParNegativeScenarios_01, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_OauthParNegativeScenarios_Missing_client_id_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenIdForUrlEncoded |
| Testcase Input |
| testCaseName=ESignet_OauthParNegativeScenarios_Missing_client_id_Neg, endPoint=/v1/esignet/oauth/par, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "client_id": "$REMOVE$", "scope": "openid profile", "response_type": "code", "redirect_uri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acr_values": "mosip:idp:acr:generated-code", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claim_locales": "en", "client_assertion_type": "urn:ietf:params:oauth:client-assertion-type:jwt-bearer", "client_assertion": "$CLIENT_ASSERTION_PAR_JWT$", "aud_key": "pushed_authorization_request_endpoint" }, output={ "error": "invalid_request" }, inputTemplate=esignet/PAR/OauthParNegativeScenarios/OauthParNegativeScenarios, outputTemplate=esignet/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate successful PAR request with missing client_id paramenter, uniqueIdentifier=TC_ESignet_OauthParNegativeScenarios_05, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_OauthParNegativeScenarios_Missing_redirect_uri_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenIdForUrlEncoded |
| Testcase Input |
| testCaseName=ESignet_OauthParNegativeScenarios_Missing_redirect_uri_Neg, endPoint=/v1/esignet/oauth/par, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "client_id": "$ID:CreateOIDCClientV3PAR_all_Valid_Smoke_sid_clientId$", "scope": "openid profile", "response_type": "code", "redirect_uri": "$REMOVE$", "display": "popup", "prompt": "login", "acr_values": "mosip:idp:acr:generated-code", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claim_locales": "en", "client_assertion_type": "urn:ietf:params:oauth:client-assertion-type:jwt-bearer", "client_assertion": "$CLIENT_ASSERTION_PAR_JWT$", "aud_key": "pushed_authorization_request_endpoint" }, output={ "error": "invalid_request" }, inputTemplate=esignet/PAR/OauthParNegativeScenarios/OauthParNegativeScenarios, outputTemplate=esignet/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate successful PAR request with missing redirect_uri paramenter, uniqueIdentifier=TC_ESignet_OauthParNegativeScenarios_07, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_OauthParNegativeScenarios_Missing_response_type_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenIdForUrlEncoded |
| Testcase Input |
| testCaseName=ESignet_OauthParNegativeScenarios_Missing_response_type_Neg, endPoint=/v1/esignet/oauth/par, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "client_id": "$ID:CreateOIDCClientV3PAR_all_Valid_Smoke_sid_clientId$", "scope": "openid profile", "response_type": "$REMOVE$", "redirect_uri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acr_values": "mosip:idp:acr:generated-code", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claim_locales": "en", "client_assertion_type": "urn:ietf:params:oauth:client-assertion-type:jwt-bearer", "client_assertion": "$CLIENT_ASSERTION_PAR_JWT$", "aud_key": "pushed_authorization_request_endpoint" }, output={ "error": "invalid_request" }, inputTemplate=esignet/PAR/OauthParNegativeScenarios/OauthParNegativeScenarios, outputTemplate=esignet/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate successful PAR request with missing Scope paramenter, uniqueIdentifier=TC_ESignet_OauthParNegativeScenarios_03, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_OauthParNegativeScenarios_invalid_claim_locales_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenIdForUrlEncoded |
| Testcase Input |
| testCaseName=ESignet_OauthParNegativeScenarios_invalid_claim_locales_Neg, endPoint=/v1/esignet/oauth/par, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "client_id": "$ID:CreateOIDCClientV3PAR_all_Valid_Smoke_sid_clientId$", "scope": "openid profile", "response_type": "code", "redirect_uri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acr_values": "mosip:idp:acr:generated-code", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claim_locales": "en1234", "client_assertion_type": "urn:ietf:params:oauth:client-assertion-type:jwt-bearer", "client_assertion": "$CLIENT_ASSERTION_PAR_JWT$", "aud_key": "pushed_authorization_request_endpoint" }, output={ }, inputTemplate=esignet/PAR/OauthParNegativeScenarios/OauthParNegativeScenarios, outputTemplate=esignet/PAR/OauthPar/OauthParResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate successful PAR request with unregistered redirect_uri paramenter, uniqueIdentifier=TC_ESignet_OauthParNegativeScenarios_11, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_OauthParNegativeScenarios_invalid_client_assertion_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenIdForUrlEncoded |
| Testcase Input |
| testCaseName=ESignet_OauthParNegativeScenarios_invalid_client_assertion_Neg, endPoint=/v1/esignet/oauth/par, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "client_id": "$ID:CreateOIDCClientV3PAR_all_Valid_Smoke_sid_clientId$", "scope": "openid profile", "response_type": "code", "redirect_uri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acr_values": "mosip:idp:acr:generated-code", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claim_locales": "en", "client_assertion_type": "urn:ietf:params:oauth:client-assertion-type:jwt-bearer", "client_assertion": "$CLIENT_ASSERTION_PAR_JWT12345$", "aud_key": "pushed_authorization_request_endpoint" }, output={ "error": "invalid_client" }, inputTemplate=esignet/PAR/OauthParNegativeScenarios/OauthParNegativeScenarios, outputTemplate=esignet/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate successful PAR request with invalid client assertion, uniqueIdentifier=TC_ESignet_OauthParNegativeScenarios_12, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_OauthParNegativeScenarios_invalid_client_assertion_Type_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenIdForUrlEncoded |
| Testcase Input |
| testCaseName=ESignet_OauthParNegativeScenarios_invalid_client_assertion_Type_Neg, endPoint=/v1/esignet/oauth/par, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "client_id": "$ID:CreateOIDCClientV3PAR_all_Valid_Smoke_sid_clientId$", "scope": "openid profile", "response_type": "code", "redirect_uri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acr_values": "mosip:idp:acr:generated-code", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claim_locales": "en", "client_assertion_type": "urn:ietf:params:oauth:client-assertion-type:jwt-bea", "client_assertion": "$CLIENT_ASSERTION_PAR_JWT$", "aud_key": "pushed_authorization_request_endpoint" }, output={ "error": "invalid_client" }, inputTemplate=esignet/PAR/OauthParNegativeScenarios/OauthParNegativeScenarios, outputTemplate=esignet/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate successful PAR request with invalid client assertion type, uniqueIdentifier=TC_ESignet_OauthParNegativeScenarios_13, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_OauthParNegativeScenarios_invalid_display_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenIdForUrlEncoded |
| Testcase Input |
| testCaseName=ESignet_OauthParNegativeScenarios_invalid_display_Neg, endPoint=/v1/esignet/oauth/par, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "client_id": "$ID:CreateOIDCClientV3PAR_all_Valid_Smoke_sid_clientId$", "scope": "openid profile", "response_type": "code", "redirect_uri": "$IDPREDIRECTURI$", "display": "*", "prompt": "login", "acr_values": "mosip:idp:acr:generated-code", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claim_locales": "en", "client_assertion_type": "urn:ietf:params:oauth:client-assertion-type:jwt-bearer", "client_assertion": "$CLIENT_ASSERTION_PAR_JWT$", "aud_key": "pushed_authorization_request_endpoint" }, output={ "error": "invalid_request" }, inputTemplate=esignet/PAR/OauthParNegativeScenarios/OauthParNegativeScenarios, outputTemplate=esignet/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate successful PAR request with unregistered redirect_uri paramenter, uniqueIdentifier=TC_ESignet_OauthParNegativeScenarios_09, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_OauthParNegativeScenarios_invalid_prompt_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenIdForUrlEncoded |
| Testcase Input |
| testCaseName=ESignet_OauthParNegativeScenarios_invalid_prompt_Neg, endPoint=/v1/esignet/oauth/par, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "client_id": "$ID:CreateOIDCClientV3PAR_all_Valid_Smoke_sid_clientId$", "scope": "openid profile", "response_type": "code", "redirect_uri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login1234567", "acr_values": "mosip:idp:acr:generated-code", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claim_locales": "en", "client_assertion_type": "urn:ietf:params:oauth:client-assertion-type:jwt-bearer", "client_assertion": "$CLIENT_ASSERTION_PAR_JWT$", "aud_key": "pushed_authorization_request_endpoint" }, output={ "error": "invalid_request" }, inputTemplate=esignet/PAR/OauthParNegativeScenarios/OauthParNegativeScenarios, outputTemplate=esignet/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate successful PAR request with unregistered redirect_uri paramenter, uniqueIdentifier=TC_ESignet_OauthParNegativeScenarios_10, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_OauthParNegativeScenarios_malformed_Client_assertion_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenIdForUrlEncoded |
| Testcase Input |
| testCaseName=ESignet_OauthParNegativeScenarios_malformed_Client_assertion_Neg, endPoint=/v1/esignet/oauth/par, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "client_id": "$ID:CreateOIDCClientV3PAR_all_Valid_Smoke_sid_clientId$", "scope": "openid profile", "response_type": "code", "redirect_uri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acr_values": "mosip:idp:acr:generated-code", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claim_locales": "en", "client_assertion_type": "urn:ietf:params:oauth:client-assertion-type:jwt-bearer", "client_assertion": "*", "aud_key": "pushed_authorization_request_endpoint" }, output={ "error": "invalid_client" }, inputTemplate=esignet/PAR/OauthParNegativeScenarios/OauthParNegativeScenarios, outputTemplate=esignet/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate successful PAR request with malformed client assertion, uniqueIdentifier=TC_ESignet_OauthParNegativeScenarios_15, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_OauthParNegativeScenarios_missing_Client_assertion_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenIdForUrlEncoded |
| Testcase Input |
| testCaseName=ESignet_OauthParNegativeScenarios_missing_Client_assertion_Neg, endPoint=/v1/esignet/oauth/par, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "client_id": "$ID:CreateOIDCClientV3PAR_all_Valid_Smoke_sid_clientId$", "scope": "openid profile", "response_type": "code", "redirect_uri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acr_values": "mosip:idp:acr:generated-code", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claim_locales": "en", "client_assertion_type": "$REMOVE$", "client_assertion": "$CLIENT_ASSERTION_PAR_JWT$", "aud_key": "pushed_authorization_request_endpoint" }, output={ "error": "invalid_client" }, inputTemplate=esignet/PAR/OauthParNegativeScenarios/OauthParNegativeScenarios, outputTemplate=esignet/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate successful PAR request with Missing client assertion, uniqueIdentifier=TC_ESignet_OauthParNegativeScenarios_14, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_OauthParNegativeScenarios_unregistered_redirect_uri_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenIdForUrlEncoded |
| Testcase Input |
| testCaseName=ESignet_OauthParNegativeScenarios_unregistered_redirect_uri_Neg, endPoint=/v1/esignet/oauth/par, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "client_id": "$ID:CreateOIDCClientV3PAR_all_Valid_Smoke_sid_clientId$", "scope": "openid profile", "response_type": "code", "redirect_uri": "$IDPREDIRECTURI1234$", "display": "popup", "prompt": "login", "acr_values": "mosip:idp:acr:generated-code", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claim_locales": "en", "client_assertion_type": "urn:ietf:params:oauth:client-assertion-type:jwt-bearer", "client_assertion": "$CLIENT_ASSERTION_PAR_JWT$", "aud_key": "pushed_authorization_request_endpoint" }, output={ "error": "invalid_request" }, inputTemplate=esignet/PAR/OauthParNegativeScenarios/OauthParNegativeScenarios, outputTemplate=esignet/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate successful PAR request with unregistered redirect_uri paramenter, uniqueIdentifier=TC_ESignet_OauthParNegativeScenarios_08, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_OauthParNegativeScenarios_without_RequestTime_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenIdForUrlEncoded |
| Testcase Input |
| testCaseName=ESignet_OauthParNegativeScenarios_without_RequestTime_Neg, endPoint=/v1/esignet/oauth/par, role=resident, templateFields=null, input={ "client_id": "$ID:CreateOIDCClientV3PAR_all_Valid_Smoke_sid_clientId$", "scope": "openid profile", "response_type": "code", "redirect_uri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acr_values": "mosip:idp:acr:generated-code", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claim_locales": "en", "client_assertion_type": "urn:ietf:params:oauth:client-assertion-type:jwt-bearer", "client_assertion": "$CLIENT_ASSERTION_PAR_JWT$", "aud_key": "pushed_authorization_request_endpoint" }, output={ }, inputTemplate=esignet/PAR/OauthParNegativeScenarios/OauthParNegativeScenarios, outputTemplate=esignet/PAR/OauthPar/OauthParResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate successful PAR request without requestTime, uniqueIdentifier=TC_ESignet_OauthParNegativeScenarios_16, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_OauthDetailsNegativeScenarios_PAR_AuthToken_Xsrf_Empty_ClientId_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_OauthDetailsNegativeScenarios_PAR_AuthToken_Xsrf_Empty_ClientId_Neg, endPoint=/v1/esignet/authorization/par-oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "requestUri": "$ID:OauthPar_all_Valid_Smoke_sid_request_uri$", "clientId": " " }, output={ "errors": [ { "errorCode": "invalid_client_id" } ] }, inputTemplate=esignet/PAR/PAROauthDetailsNegativeScenarios/PAROauthDetailsNegativeScenarios, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate successful retrieval of OAuth details in PAR flow with Empty clientId in request parameter, uniqueIdentifier=TC_ESignet_PAROauthDetailsNegativeScenarios_02, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_OauthDetailsNegativeScenarios_PAR_AuthToken_Xsrf_already_requestURI_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_OauthDetailsNegativeScenarios_PAR_AuthToken_Xsrf_already_requestURI_Neg, endPoint=/v1/esignet/authorization/par-oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "requestUri": "$ID:OauthPar_all_Valid_Smoke_sid_request_uri$", "clientId": "$ID:CreateOIDCClientV3PAR_all_Valid_Smoke_sid_clientId$" }, output={ "errors": [ { "errorCode": "invalid_request" } ] }, inputTemplate=esignet/PAR/PAROauthDetailsNegativeScenarios/PAROauthDetailsNegativeScenarios, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate successful retrieval of OAuth details in PAR flow with already used RequestURI in request parameter, uniqueIdentifier=TC_ESignet_PAROauthDetailsNegativeScenarios_06, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_OauthDetailsNegativeScenarios_PAR_AuthToken_Xsrf_invalid_requestURI_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_OauthDetailsNegativeScenarios_PAR_AuthToken_Xsrf_invalid_requestURI_Neg, endPoint=/v1/esignet/authorization/par-oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "requestUri": "123456wk31-I0Zx7JRIorYsjfkPB0yQ-4K0tc7LwSzaJ9ft_U", "clientId": "$ID:CreateOIDCClientV3PAR_all_Valid_Smoke_sid_clientId$" }, output={ "errors": [ { "errorCode": "invalid_request" } ] }, inputTemplate=esignet/PAR/PAROauthDetailsNegativeScenarios/PAROauthDetailsNegativeScenarios, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate successful retrieval of OAuth details in PAR flow with invalid RequestURI in request parameter, uniqueIdentifier=TC_ESignet_PAROauthDetailsNegativeScenarios_04, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_OauthDetailsNegativeScenarios_PAR_AuthToken_Xsrf_invalid_request_method_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_OauthDetailsNegativeScenarios_PAR_AuthToken_Xsrf_invalid_request_method_Neg, endPoint=/v1/esignet/authorization/par-oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "requestUri": "$ID:OauthPar_all_Valid_Smoke_sid_request_uri$", "clientId": "$ID:CreateOIDCClientV3PAR_all_Valid_Smoke_sid_clientId$" }, output={ "errors": [ { "errorCode": "invalid_request" } ] }, inputTemplate=esignet/PAR/PAROauthDetailsNegativeScenarios/PAROauthDetailsNegativeScenarios, outputTemplate=esignet/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate successful retrieval of OAuth details in PAR flow with invalid request method, uniqueIdentifier=TC_ESignet_PAROauthDetailsNegativeScenarios_03, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_OauthDetailsNegativeScenarios_PAR_AuthToken_Xsrf_missing_ClientId_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_OauthDetailsNegativeScenarios_PAR_AuthToken_Xsrf_missing_ClientId_Neg, endPoint=/v1/esignet/authorization/par-oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "requestUri": "$ID:OauthPar_all_Valid_Smoke_sid_request_uri$", "clientId": "$REMOVE$" }, output={ "errors": [ { "errorCode": "invalid_client_id" } ] }, inputTemplate=esignet/PAR/PAROauthDetailsNegativeScenarios/PAROauthDetailsNegativeScenarios, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate successful retrieval of OAuth details in PAR flow with missing clientId in request parameter, uniqueIdentifier=TC_ESignet_PAROauthDetailsNegativeScenarios_01, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_OauthDetailsNegativeScenarios_PAR_AuthToken_Xsrf_without_requestURI_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_OauthDetailsNegativeScenarios_PAR_AuthToken_Xsrf_without_requestURI_Neg, endPoint=/v1/esignet/authorization/par-oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "requestUri": "$REMOVE$", "clientId": "$ID:CreateOIDCClientV3PAR_all_Valid_Smoke_sid_clientId$" }, output={ "errors": [ { "errorCode": "invalid_request" } ] }, inputTemplate=esignet/PAR/PAROauthDetailsNegativeScenarios/PAROauthDetailsNegativeScenarios, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate successful retrieval of OAuth details in PAR flow without RequestURI in request parameter, uniqueIdentifier=TC_ESignet_PAROauthDetailsNegativeScenarios_05, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_DPoPCreateOIDCClientV3_all_Valid_Smoke_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_DPoPCreateOIDCClientV3_all_Valid_Smoke_sid, endPoint=/v1/esignet/client-mgmt/client, role=partner, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$RANDOMPARTNERID$", "clientName": "MOSIP DPoP OIDC Client", "logoUri": "https://health-services.com/logo.png", "relyingPartyId": "mock-relying-party-id", "redirectUris": "$IDPREDIRECTURI$", "publicKey": "$OIDC_JWK_KEY_DPoP$", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{"acrValues": "mosip:idp:acr:static-code"},{"acrValues": "mosip:idp:acr:generated-code"},{"acrValues": "mosip:idp:acr:biometrics"}], "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt", "keyLang1": "$1STLANG$", "clientNameLang": "MOSIP DPoP OIDC Client", "userinfo_response_type": "JWS", "purpose_title": "title", "purpose_type": "verify", "purpose_subTitle": "subtitle", "signup_banner_required": true, "forgot_pwd_link_required": true, "consent_expire_in_mins": 120, "dpop_bound_access_tokens": true }, output={ "status": "ACTIVE" }, inputTemplate=esignet/DPoP/DPoPCreateOIDCClientV3/DPoPCreateOIDCClient, outputTemplate=esignet/DPoP/DPoPCreateOIDCClientV3/DPoPCreateOIDCClientResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create of OIDC Client V3 with all valid data, uniqueIdentifier=TC_ESignet_PARCreateOIDCClientV3_01, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_OauthDPoP_all_Valid_Smoke_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenIdForUrlEncoded |
| Testcase Input |
| testCaseName=ESignet_OauthDPoP_all_Valid_Smoke_sid, endPoint=/v1/esignet/oauth/par, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "client_id": "$ID:DPoPCreateOIDCClientV3_all_Valid_Smoke_sid_clientId$", "scope": "openid profile", "response_type": "code", "redirect_uri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acr_values": "mosip:idp:acr:generated-code", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claim_locales": "en", "client_assertion_type": "urn:ietf:params:oauth:client-assertion-type:jwt-bearer", "client_assertion": "$CLIENT_ASSERTION_DPoP_JWT$", "aud_key": "pushed_authorization_request_endpoint", "dpop_jkt": "$DPOP_JKT$" }, output={ }, inputTemplate=esignet/DPoP/OauthDPoP/OauthDPoP, outputTemplate=esignet/PAR/OauthDPoP/OauthDPoPResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate successful DPoP request with valid client details, uniqueIdentifier=TC_ESignet_OauthDPoP_01, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_OAuthDetailsRequest_DPoP_AuthToken_Xsrf_all_Valid_Smoke_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_OAuthDetailsRequest_DPoP_AuthToken_Xsrf_all_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/par-oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "requestUri": "$ID:OauthDPoP_all_Valid_Smoke_sid_request_uri$", "clientId": "$ID:DPoPCreateOIDCClientV3_all_Valid_Smoke_sid_clientId$" }, output={ }, inputTemplate=esignet/DPoP/DPoPOauthDetails/DPoPOauthDetails, outputTemplate=esignet/DPoP/DPoPOauthDetails/DPoPOauthDetailsResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate successful retrieval of OAuth details in DPoP flow, uniqueIdentifier=TC_ESignet_DPoPOauthDetails_01, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_DPoPAuthenticateUserV3_AuthToken_Xsrf__uin_Otp_Valid_forUserInfo_Smoke |
| Testcase Dependency |
| [] |
| Class Name |
| PostWithAutogenIdWithOtpGenerate |
| Testcase Input |
| testCaseName=ESignet_DPoPAuthenticateUserV3_AuthToken_Xsrf__uin_Otp_Valid_forUserInfo_Smoke, endPoint=/v1/esignet/authorization/v3/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_DPoP_AuthToken_Xsrf_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_DPoP_AuthToken_Xsrf_all_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_For_DPOP_smoke_Pos_UIN$", "authFactorType" : "OTP", "challenge" : "$ID:AddIdentity_For_DPOP_smoke_Pos_EMAIL$", "sendOtp":{ "encodedHash": "$ID:OAuthDetailsRequest_DPoP_AuthToken_Xsrf_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_DPoP_AuthToken_Xsrf_all_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_For_DPOP_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendOtp/SendOtp", "sendOtpEndPoint": "/v1/esignet/authorization/send-otp" } }, output={ "sendOtpResp":{ "sendOtpResTemplate":"esignet/SendOtp/SendOtpResult" } }, inputTemplate=esignet/DPoP/DPoPAuthenticateUserV3/DPoPAuthenticateUserV3, outputTemplate=esignet/DPoP/DPoPAuthenticateUserV3/DPoPAuthenticateUserV3Result, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Verify that the PARAuthenticateUserV3 endpoint authenticates the user successfully with valid credentials, uniqueIdentifier=TC_ESignet_DPoPAuthenticateUserV3_01, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_AuthorizationCode_DPoP__AuthToken_Xsrf_All_Valid_forUserInfo_Smoke_sid |
| Testcase Dependency |
| [TC_ESignet_OAuthDetailsRequest_01, TC_ESignet_CreateOIDCClient_01] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_AuthorizationCode_DPoP__AuthToken_Xsrf_All_Valid_forUserInfo_Smoke_sid, endPoint=/v1/esignet/authorization/auth-code, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_DPoP_AuthToken_Xsrf_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_DPoP_AuthToken_Xsrf_all_Valid_Smoke_sid_transactionId$", "acceptedClaims": [{claim: "phone_number"},{claim: "email"}] }, output={ }, inputTemplate=esignet/DPoP/DPoPAuthorizationCode/DPoPAuthorizationCode, outputTemplate=esignetDPoP/DPoPAuthorizationCode/DPoPAuthorizationCodeResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate successful authorization code generation in PAR flow, uniqueIdentifier=TC_ESignet_AuthorizationCode_01, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_GenerateToken_DPoP_AuthToken_Xsrf_Valid_Smoke_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenIdForUrlEncoded |
| Testcase Input |
| testCaseName=ESignet_GenerateToken_DPoP_AuthToken_Xsrf_Valid_Smoke_sid, endPoint=$GETENDPOINTFROMWELLKNOWN$, role=resident, templateFields=null, input={ "dpop_key": "DPoP", "dpop_value": "$DPOP_PROOF$", "grant_type": "authorization_code", "code": "$ID:AuthorizationCode_DPoP__AuthToken_Xsrf_All_Valid_forUserInfo_Smoke_sid_code$", "client_id": "$ID:DPoPCreateOIDCClientV3_all_Valid_Smoke_sid_clientId$", "client_assertion_type": "urn:ietf:params:oauth:client-assertion-type:jwt-bearer", "client_assertion": "$CLIENT_ASSERTION_DPoP_JWT$", "redirect_uri": "$IDPREDIRECTURI$", "aud_key": "token_endpoint" }, output={ }, inputTemplate=esignet/DPoP/DPoPGenerateToken/DPoPGenerateToken, outputTemplate=esignet/DPoP/DPoPGenerateToken/DPoPGenerateTokenResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generate token with all valid details UIN for user info, uniqueIdentifier=TC_ESignet_DPoPGenerateToken_01, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_GetOidcUserInfo_UIN_Dpop_AccessToken_StatusCode_Valid_Smoke |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=ESignet_GetOidcUserInfo_UIN_Dpop_AccessToken_StatusCode_Valid_Smoke, endPoint=/v1/esignet/oidc/userinfo, role=resident, templateFields=null, input={ "dpop_access_token": "$ID:GenerateToken_DPoP_AuthToken_Xsrf_Valid_Smoke_sid_access_token$", "authorization_key": "Authorization", "dpop_key": "DPoP", "dpop_value": "$DPOP_PROOF_WITH_ACCESS_TOKEN$" }, output=200, inputTemplate=esignet/DPoP/DPoPGetUserInfo/DPoPGetUserInfo, outputTemplate=esignet/DPoP/DPoPGetUserInfo/DPoPGetUserInfoResult, restMethod=get, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Get OIDC user info with all valid details UIN, uniqueIdentifier=TC_ESignet_DPoPGetUserInfo_01, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_OautDPoPNegativeScenarios_Invalid_JKT_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenIdForUrlEncoded |
| Testcase Input |
| testCaseName=ESignet_OautDPoPNegativeScenarios_Invalid_JKT_Neg, endPoint=/v1/esignet/oauth/par, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "client_id": "$ID:DPoPCreateOIDCClientV3_all_Valid_Smoke_sid_clientId$", "scope": "openid profile", "response_type": "code", "redirect_uri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acr_values": "mosip:idp:acr:generated-code", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claim_locales": "en", "client_assertion_type": "urn:ietf:params:oauth:client-assertion-type:jwt-bearer", "client_assertion": "$CLIENT_ASSERTION_DPoP_JWT$", "aud_key": "pushed_authorization_request_endpoint", "dpop_jkt": "header_invalid_value" }, output={ }, inputTemplate=esignet/DPoP/OauthDPoPNegativeScenarios/OauthDPoPNegativeScenarios, outputTemplate=esignet/PAR/OauthDPoP/OauthDPoPResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate successful DPoP request with valid client details, uniqueIdentifier=TC_ESignet_OautDPoPNegativeScenarios_01, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_OautDPoPNegativeScenarios_without_Clientassertion_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenIdForUrlEncoded |
| Testcase Input |
| testCaseName=ESignet_OautDPoPNegativeScenarios_without_Clientassertion_Neg, endPoint=/v1/esignet/oauth/par, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "client_id": "$ID:DPoPCreateOIDCClientV3_all_Valid_Smoke_sid_clientId$", "scope": "openid profile", "response_type": "code", "redirect_uri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acr_values": "mosip:idp:acr:generated-code", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claim_locales": "en", "client_assertion_type": "urn:ietf:params:oauth:client-assertion-type:jwt-bearer", "client_assertion": "$CLIENT_ASSERTION_DPoP_J$", "aud_key": "pushed_authorization_request_endpoint", "dpop_jkt": "$DPOP_JKT$" }, output={ "error": "invalid_client" }, inputTemplate=esignet/DPoP/OauthDPoPNegativeScenarios/OauthDPoPNegativeScenarios, outputTemplate=esignet/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate successful DPoP request with invalid client assertion, uniqueIdentifier=TC_ESignet_OautDPoPNegativeScenarios_03, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_OautDPoPNegativeScenarios_without_JKT_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenIdForUrlEncoded |
| Testcase Input |
| testCaseName=ESignet_OautDPoPNegativeScenarios_without_JKT_Neg, endPoint=/v1/esignet/oauth/par, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "client_id": "$ID:DPoPCreateOIDCClientV3_all_Valid_Smoke_sid_clientId$", "scope": "openid profile", "response_type": "code", "redirect_uri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acr_values": "mosip:idp:acr:generated-code", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claim_locales": "en", "client_assertion_type": "urn:ietf:params:oauth:client-assertion-type:jwt-bearer", "client_assertion": "$CLIENT_ASSERTION_DPoP_JWT$", "aud_key": "pushed_authorization_request_endpoint", "dpop_jkt": "$REMOVE$" }, output={ }, inputTemplate=esignet/DPoP/OauthDPoPNegativeScenarios/OauthDPoPNegativeScenarios, outputTemplate=esignet/PAR/OauthDPoP/OauthDPoPResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate successful DPoP request without dpop_jkt, uniqueIdentifier=TC_ESignet_OautDPoPNegativeScenarios_02, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_OauthDPoPNegativeSceanrios_Invalid_client_Id_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenIdForUrlEncoded |
| Testcase Input |
| testCaseName=ESignet_OauthDPoPNegativeSceanrios_Invalid_client_Id_Neg, endPoint=/v1/esignet/oauth/par, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "client_id": "DpopinvalidClientID12345", "scope": "openid profile", "response_type": "code", "redirect_uri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acr_values": "mosip:idp:acr:generated-code", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claim_locales": "en", "client_assertion_type": "urn:ietf:params:oauth:client-assertion-type:jwt-bearer", "client_assertion": "$CLIENT_ASSERTION_DPoP_JWT$", "aud_key": "pushed_authorization_request_endpoint", "dpop_jkt": "$DPOP_JKT$" }, output={ "error": "invalid_request" }, inputTemplate=esignet/DPoP/OauthDPoP/OauthDPoP, outputTemplate=esignet/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate successful DPoP request with invalid client ID details, uniqueIdentifier=TC_ESignet_OauthDPoPNegativeSceanrios_04, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_GenerateToken_DPoP_AuthToken_Xsrf_Invalid_dpopKey_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenIdForUrlEncoded |
| Testcase Input |
| testCaseName=ESignet_GenerateToken_DPoP_AuthToken_Xsrf_Invalid_dpopKey_Neg, endPoint=$GETENDPOINTFROMWELLKNOWN$, role=resident, templateFields=null, input={ "dpop_key": "DPoP123456", "dpop_value": "$DPOP_PROOF$", "grant_type": "authorization_code", "code": "$ID:AuthorizationCode_DPoP__AuthToken_Xsrf_All_Valid_forUserInfo_Smoke_sid_code$", "client_id": "$ID:DPoPCreateOIDCClientV3_all_Valid_Smoke_sid_clientId$", "client_assertion_type": "urn:ietf:params:oauth:client-assertion-type:jwt-bearer", "client_assertion": "$CLIENT_ASSERTION_DPoP_JWT$", "redirect_uri": "$IDPREDIRECTURI$", "aud_key": "token_endpoint" }, output={ "error": "invalid_grant" }, inputTemplate=esignet/DPoP/DPoPGenerateTokenNegativeScenarios/DPoPGenerateTokenNegativeScenarios, outputTemplate=esignet/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generate token with invalid dpop key, uniqueIdentifier=TC_ESignet_DPoPGenerateTokenInvalidScenarios_01, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_GenerateToken_DPoP_AuthToken_Xsrf_Invalid_dpopvalue_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenIdForUrlEncoded |
| Testcase Input |
| testCaseName=ESignet_GenerateToken_DPoP_AuthToken_Xsrf_Invalid_dpopvalue_Neg, endPoint=$GETENDPOINTFROMWELLKNOWN$, role=resident, templateFields=null, input={ "dpop_key": "DPoP", "dpop_value": "$DPOP_PROOF$", "grant_type": "authorization_code", "code": "$ID:AuthorizationCode_DPoP__AuthToken_Xsrf_All_Valid_forUserInfo_Smoke_sid_code$", "client_id": "$ID:DPoPCreateOIDCClientV3_all_Valid_Smoke_sid_clientId$", "client_assertion_type": "urn:ietf:params:oauth:client-assertion-type:jwt-bearer", "client_assertion": "$CLIENT_ASSERTION_DPoP_JWT$", "redirect_uri": "$IDPREDIRECTURI$", "aud_key": "token_endpoint" }, output={ "error": "invalid_grant" }, inputTemplate=esignet/DPoP/DPoPGenerateTokenNegativeScenarios/DPoPGenerateTokenNegativeScenarios, outputTemplate=esignet/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generate token without dpop value, uniqueIdentifier=TC_ESignet_DPoPGenerateTokenInvalidScenarios_04, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_OAuthDetailsNegativeScenarios_AuthToken_Xsrf_sid_Invalid_DPOP_Token_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_OAuthDetailsNegativeScenarios_AuthToken_Xsrf_sid_Invalid_DPOP_Token_Neg, endPoint=/v1/esignet/authorization/par-oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "requestUri": "$ID:OauthDPoP_all_Valid_Smoke_sid_request_uri$", "clientId": "$ID:DPoPCreateOIDCClientV3_all_Valid_Smoke_sid_clientId$" }, output={ "errors": [ { "errorCode": "invalid_request" } ] }, inputTemplate=esignet/DPoP/DPoPOauthDetailsNegativeScenarios/DPoPOauthDetailsNegativeScenarios, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate successful retrieval of OAuth details in DPOP flow with invalid DPoP token in request, uniqueIdentifier=TC_ESignet_DPoPOauthDetailsNegativeScenarios_01, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_OAuthDetailsNegativeScenarios_DPoP_AuthToken_Xsrf_already_requestURI_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_OAuthDetailsNegativeScenarios_DPoP_AuthToken_Xsrf_already_requestURI_Neg, endPoint=/v1/esignet/authorization/par-oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "requestUri": "$ID:OauthDPoP_all_Valid_Smoke_sid_request_uri$", "clientId": "$ID:DPoPCreateOIDCClientV3_all_Valid_Smoke_sid_clientId$" }, output={ "errors": [ { "errorCode": "invalid_request" } ] }, inputTemplate=esignet/PAR/PAROauthDetailsNegativeScenarios/PAROauthDetailsNegativeScenarios, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate successful retrieval of OAuth details in DPOP flow with already used RequestURI in request parameter, uniqueIdentifier=TC_ESignet_PAROauthDetailsNegativeScenarios_07, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_OAuthDetailsNegativeScenarios_DPoP_AuthToken_Xsrf_sid_Empty_ClientId_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_OAuthDetailsNegativeScenarios_DPoP_AuthToken_Xsrf_sid_Empty_ClientId_Neg, endPoint=/v1/esignet/authorization/par-oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "requestUri": "$ID:OauthDPoP_all_Valid_Smoke_sid_request_uri$", "clientId": " " }, output={ "errors": [ { "errorCode": "invalid_client_id" } ] }, inputTemplate=esignet/PAR/PAROauthDetailsNegativeScenarios/PAROauthDetailsNegativeScenarios, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate successful retrieval of OAuth details in DPOP flow with Empty clientId in request parameter, uniqueIdentifier=TC_ESignet_PAROauthDetailsNegativeScenarios_03, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_OAuthDetailsNegativeScenarios_DPoP_AuthToken_Xsrf_sid_invalid_request_method_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_OAuthDetailsNegativeScenarios_DPoP_AuthToken_Xsrf_sid_invalid_request_method_Neg, endPoint=/v1/esignet/authorization/par-oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "requestUri": "$ID:OauthDPoP_all_Valid_Smoke_sid_request_uri$", "clientId": "$ID:DPoPCreateOIDCClientV3_all_Valid_Smoke_sid_clientId$" }, output={ "errors": [ { "errorCode": "invalid_request" } ] }, inputTemplate=esignet/PAR/PAROauthDetailsNegativeScenarios/PAROauthDetailsNegativeScenarios, outputTemplate=esignet/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate successful retrieval of OAuth details in DPOP flow with invalid request method, uniqueIdentifier=TC_ESignet_PAROauthDetailsNegativeScenarios_04, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_OAuthDetailsNegativeScenarios_DPoP_AuthToken_Xsrf_sid_missing_ClientId_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_OAuthDetailsNegativeScenarios_DPoP_AuthToken_Xsrf_sid_missing_ClientId_Neg, endPoint=/v1/esignet/authorization/par-oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "requestUri": "$ID:OauthDPoP_all_Valid_Smoke_sid_request_uri$", "clientId": "$REMOVE$" }, output={ "errors": [ { "errorCode": "invalid_client_id" } ] }, inputTemplate=esignet/PAR/PAROauthDetailsNegativeScenarios/PAROauthDetailsNegativeScenarios, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate successful retrieval of OAuth details in DPOP flow with missing clientId in request parameter, uniqueIdentifier=TC_ESignet_DPoPOauthDetailsNegativeScenarios_02, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_OAuthDetailsNegativeScenarios_DPoP_AuthToken_Xsrf_sid_requestURI_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_OAuthDetailsNegativeScenarios_DPoP_AuthToken_Xsrf_sid_requestURI_Neg, endPoint=/v1/esignet/authorization/par-oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "requestUri": "123456wk31-I0Zx7JRIorYsjfkPB0yQ-4K0tc7LwSzaJ9ft_U", "clientId": "$ID:DPoPCreateOIDCClientV3_all_Valid_Smoke_sid_clientId$" }, output={ "errors": [ { "errorCode": "invalid_request" } ] }, inputTemplate=esignet/PAR/PAROauthDetailsNegativeScenarios/PAROauthDetailsNegativeScenarios, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate successful retrieval of OAuth details in DPOP flow with invalid RequestURI in request parameter, uniqueIdentifier=TC_ESignet_PAROauthDetailsNegativeScenarios_05, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_OAuthDetailsNegativeScenarios_DPoP_AuthToken_Xsrf_without_requestURI_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_OAuthDetailsNegativeScenarios_DPoP_AuthToken_Xsrf_without_requestURI_Neg, endPoint=/v1/esignet/authorization/par-oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "requestUri": "$REMOVE$", "clientId": "$ID:DPoPCreateOIDCClientV3_all_Valid_Smoke_sid_clientId$" }, output={ "errors": [ { "errorCode": "invalid_request" } ] }, inputTemplate=esignet/PAR/PAROauthDetailsNegativeScenarios/PAROauthDetailsNegativeScenarios, outputTemplate=esignet/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate successful retrieval of OAuth details in DPOP flow without RequestURI in request parameter, uniqueIdentifier=TC_ESignet_PAROauthDetailsNegativeScenarios_06, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_OIDCClientV3_VerifiedClaims_all_Valid_Smoke_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_OIDCClientV3_VerifiedClaims_all_Valid_Smoke_sid, endPoint=/v1/esignet/client-mgmt/client, role=partner, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$RANDOMPARTNERID$", "clientName": "MOSIP OIDC Client with Verified Claims", "logoUri": "https://health-services.com/logo.png", "relyingPartyId": "Bharathi-Inc", "redirectUris": "$IDPREDIRECTURI$", "publicKey": "$OIDCJWKKEY10$", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{"acrValues": "mosip:idp:acr:static-code"},{"acrValues": "mosip:idp:acr:generated-code"},{"acrValues": "mosip:idp:acr:biometrics"}], "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt", "keyLang1": "$1STLANG$", "clientNameLang": "MOSIP OIDC Client with Verified Claims", "userinfo_response_type": "JWS", "purpose_title": "title", "purpose_type": "verify", "purpose_subTitle": "subtitle", "signup_banner_required": true, "forgot_pwd_link_required": true, "consent_expire_in_mins": 30 }, output={ "status": "ACTIVE" }, inputTemplate=esignet/OTPAuthFactorFlow/VerifiedClaims/CreateClient/CreateOIDCClient, outputTemplate=esignet/OTPAuthFactorFlow/VerifiedClaims/CreateClient/CreateOIDCClientResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create OIDC Client with all valid data with Verified Claims, uniqueIdentifier=TC_ESignet_OIDCClientV3VerifiedClaims_01, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_OAuthDetailsRequest_VerifiedClaims_V3_AuthToken_Xsrf_Smoke_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_OAuthDetailsRequest_VerifiedClaims_V3_AuthToken_Xsrf_Smoke_sid, endPoint=/v1/esignet/authorization/v3/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:OIDCClientV3_VerifiedClaims_all_Valid_Smoke_sid_clientId$", "scope": "openid profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:generated-code", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "urlInfo1724138417665", "claimsLocales": "en", "uiLocales": "en-US" }, output={ }, inputTemplate=esignet/OTPAuthFactorFlow/VerifiedClaims/OAuthDetails/OAuthDetailsRequest, outputTemplate=esignet/OTPAuthFactorFlow/VerifiedClaims/OAuthDetails/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Get OAuth details with claims as with Verified Claims, uniqueIdentifier=TC_Signup_ESignet_OAuthDetailsRequestV3VerifiedClaims_01, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_AuthenticateUser_VerifiedClaims_V3_AuthToken_Xsrf__Smoke |
| Testcase Dependency |
| [] |
| Class Name |
| PostWithAutogenIdWithOtpGenerate |
| Testcase Input |
| testCaseName=ESignet_AuthenticateUser_VerifiedClaims_V3_AuthToken_Xsrf__Smoke, endPoint=/v1/esignet/authorization/v3/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_VerifiedClaims_V3_AuthToken_Xsrf_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_VerifiedClaims_V3_AuthToken_Xsrf_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_For_OTPFlow_VerifiedClaims_smoke_Pos_UIN$", "authFactorType" : "OTP", "challenge" : "$ID:AddIdentity_For_OTPFlow_VerifiedClaims_smoke_Pos_EMAIL$", "sendOtp":{ "encodedHash": "$ID:OAuthDetailsRequest_VerifiedClaims_V3_AuthToken_Xsrf_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_VerifiedClaims_V3_AuthToken_Xsrf_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_For_OTPFlow_VerifiedClaims_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendOtp/SendOtp", "sendOtpEndPoint": "/v1/esignet/authorization/send-otp" } }, output={ "sendOtpResp":{ "sendOtpResTemplate":"esignet/SendOtp/SendOtpResult" } }, inputTemplate=esignet/OTPAuthFactorFlow/VerifiedClaims/Authenticate/AuthenticateUser, outputTemplate=esignet/OTPAuthFactorFlow/VerifiedClaims/Authenticate/AuthenticateUserResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=null, uniqueIdentifier=null, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_AuthorizationCode_Verified_Claims_Smoke_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_AuthorizationCode_Verified_Claims_Smoke_sid, endPoint=/v1/esignet/authorization/auth-code, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_VerifiedClaims_V3_AuthToken_Xsrf_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_VerifiedClaims_V3_AuthToken_Xsrf_Smoke_sid_transactionId$", "acceptedClaims": [{claim: "phone_number"},{claim: "email"}] }, output={ }, inputTemplate=esignet/OTPAuthFactorFlow/VerifiedClaims/AuthCode/AuthorizationCode, outputTemplate=esignet/OTPAuthFactorFlow/VerifiedClaims/AuthCode/AuthorizationCodeResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Authorization code request for end to end flow, uniqueIdentifier=TC_ESignet_AuthorizationCodeVerifiedClaims_01, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_GenerateToken_Verified_Claims_Valid_Smoke_sid |
| Testcase Dependency |
| [TC_ESignet_AuthorizationCode_01, TC_ESignet_OAuthDetailsRequest_01, TC_ESignet_CreateOIDCClient_01] |
| Class Name |
| SimplePostForAutoGenIdForUrlEncoded |
| Testcase Input |
| testCaseName=ESignet_GenerateToken_Verified_Claims_Valid_Smoke_sid, endPoint=$GETENDPOINTFROMWELLKNOWN$, role=resident, templateFields=null, input={ "grant_type": "authorization_code", "code": "$ID:AuthorizationCode_Verified_Claims_Smoke_sid_code$", "client_id": "$ID:OIDCClientV3_VerifiedClaims_all_Valid_Smoke_sid_clientId$", "client_assertion_type": "urn:ietf:params:oauth:client-assertion-type:jwt-bearer", "client_assertion": "$CLIENT_ASSERTION_USER10_JWK$", "redirect_uri": "$IDPREDIRECTURI$" }, output={ "token_type": "Bearer" }, inputTemplate=esignet/OTPAuthFactorFlow/VerifiedClaims/GenToken/GenerateToken, outputTemplate=esignet/OTPAuthFactorFlow/VerifiedClaims/GenToken/GenerateTokenResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generate token with all valid details UIN for user info, uniqueIdentifier=TC_ESignet_GenerateToken_01, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_GetOidcUserInfo_IdpAccessToken_StatusCode_for_Verified_Claims_Valid_Smoke |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=ESignet_GetOidcUserInfo_IdpAccessToken_StatusCode_for_Verified_Claims_Valid_Smoke, endPoint=/v1/esignet/oidc/userinfo, role=resident, templateFields=null, input={ "idpAccessToken": "$ID:GenerateToken_Verified_Claims_Valid_Smoke_sid_access_token$" }, output=200, inputTemplate=esignet/OTPAuthFactorFlow/VerifiedClaims/Userinfo/GetOidcUserInfo, outputTemplate=esignet/OTPAuthFactorFlow/VerifiedClaims/Userinfo/GetOidcUserInfoResult, restMethod=get, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Get OIDC user info with Verified Claims, uniqueIdentifier=TC_ESignet_GetOidcUserInfoVerifiedClaims_01, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_OIDCClientV3_WithoutVerifiedClaims_all_Valid_Smoke_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_OIDCClientV3_WithoutVerifiedClaims_all_Valid_Smoke_sid, endPoint=/v1/esignet/client-mgmt/client, role=partner, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$RANDOMPARTNERID$", "clientName": "MOSIP OIDC Client without Verified Claims", "logoUri": "https://health-services.com/logo.png", "relyingPartyId": "Bharathi-Inc", "redirectUris": "$IDPREDIRECTURI$", "publicKey": "$OIDCJWKKEY11$", "userClaims1": "name", "userClaims2": "email", "userClaims3": "gender", "userClaims4": "phone_number", "userClaims5": "birthdate", "authContextRefs": [{"acrValues": "mosip:idp:acr:static-code"},{"acrValues": "mosip:idp:acr:generated-code"},{"acrValues": "mosip:idp:acr:biometrics"}], "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt", "keyLang1": "$1STLANG$", "clientNameLang": "MOSIP OIDC Client without Verified Claims", "userinfo_response_type": "JWS", "purpose_title": "title", "purpose_type": "verify", "purpose_subTitle": "subtitle", "signup_banner_required": true, "forgot_pwd_link_required": true, "consent_expire_in_mins": 30 }, output={ "status": "ACTIVE" }, inputTemplate=esignet/OTPAuthFactorFlow/WithoutVerifiedClaims/CreateClient/CreateOIDCClient, outputTemplate=esignet/OTPAuthFactorFlow/WithoutVerifiedClaims/CreateClient/CreateOIDCClientResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create OIDC Client with all valid data without Verified Claims, uniqueIdentifier=TC_ESignet_OIDCClientV3WithoutVerifiedClaims_01, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_OAuthDetailsRequest_Without_VerifiedClaims_V3_AuthToken_Xsrf_Smoke_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_OAuthDetailsRequest_Without_VerifiedClaims_V3_AuthToken_Xsrf_Smoke_sid, endPoint=/v1/esignet/authorization/v3/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$ID:OIDCClientV3_WithoutVerifiedClaims_all_Valid_Smoke_sid_clientId$", "scope": "openid profile", "responseType": "code", "redirectUri": "$IDPREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:generated-code", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "urlInfo1724138417665", "claimsLocales": "en", "uiLocales": "en-US" }, output={ }, inputTemplate=esignet/OTPAuthFactorFlow/WithoutVerifiedClaims/OAuthDetails/OAuthDetailsRequest, outputTemplate=esignet/OTPAuthFactorFlow/WithoutVerifiedClaims/OAuthDetails/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Get OAuth details with claims as without Verified Claims, uniqueIdentifier=TC_Signup_ESignet_OAuthDetailsRequestV3WithoutVerifiedClaims_01, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_AuthenticateUser_Without_VerifiedClaims_V3_AuthToken_Xsrf__Smoke |
| Testcase Dependency |
| [] |
| Class Name |
| PostWithAutogenIdWithOtpGenerate |
| Testcase Input |
| testCaseName=ESignet_AuthenticateUser_Without_VerifiedClaims_V3_AuthToken_Xsrf__Smoke, endPoint=/v1/esignet/authorization/v3/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_Without_VerifiedClaims_V3_AuthToken_Xsrf_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_Without_VerifiedClaims_V3_AuthToken_Xsrf_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_For_OTPFlow_WithoutVerifiedClaims_smoke_Pos_UIN$", "authFactorType" : "OTP", "challenge" : "$ID:AddIdentity_For_OTPFlow_WithoutVerifiedClaims_smoke_Pos_EMAIL$", "sendOtp":{ "encodedHash": "$ID:OAuthDetailsRequest_Without_VerifiedClaims_V3_AuthToken_Xsrf_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_Without_VerifiedClaims_V3_AuthToken_Xsrf_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_For_OTPFlow_WithoutVerifiedClaims_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "esignet/SendOtp/SendOtp", "sendOtpEndPoint": "/v1/esignet/authorization/send-otp" } }, output={ "sendOtpResp":{ "sendOtpResTemplate":"esignet/SendOtp/SendOtpResult" } }, inputTemplate=esignet/OTPAuthFactorFlow/WithoutVerifiedClaims/Authenticate/AuthenticateUser, outputTemplate=esignet/OTPAuthFactorFlow/WithoutVerifiedClaims/Authenticate/AuthenticateUserResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=null, uniqueIdentifier=null, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_AuthorizationCode_Without_Verified_Claims_Smoke_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=ESignet_AuthorizationCode_Without_Verified_Claims_Smoke_sid, endPoint=/v1/esignet/authorization/auth-code, role=resident, templateFields=null, input={ "encodedHash": "$ID:OAuthDetailsRequest_Without_VerifiedClaims_V3_AuthToken_Xsrf_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:OAuthDetailsRequest_Without_VerifiedClaims_V3_AuthToken_Xsrf_Smoke_sid_transactionId$", "acceptedClaims": [{claim: "phone_number"},{claim: "email"}] }, output={ }, inputTemplate=esignet/OTPAuthFactorFlow/WithoutVerifiedClaims/AuthCode/AuthorizationCode, outputTemplate=esignet/OTPAuthFactorFlow/WithoutVerifiedClaims/AuthCode/AuthorizationCodeResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Authorization code request for end to end flow, uniqueIdentifier=TC_ESignet_AuthorizationCodeWithoutVerifiedClaims_01, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_GenerateToken_Without_Verified_Claims_Valid_Smoke_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenIdForUrlEncoded |
| Testcase Input |
| testCaseName=ESignet_GenerateToken_Without_Verified_Claims_Valid_Smoke_sid, endPoint=$GETENDPOINTFROMWELLKNOWN$, role=resident, templateFields=null, input={ "grant_type": "authorization_code", "code": "$ID:AuthorizationCode_Without_Verified_Claims_Smoke_sid_code$", "client_id": "$ID:OIDCClientV3_WithoutVerifiedClaims_all_Valid_Smoke_sid_clientId$", "client_assertion_type": "urn:ietf:params:oauth:client-assertion-type:jwt-bearer", "client_assertion": "$CLIENT_ASSERTION_USER11_JWK$", "redirect_uri": "$IDPREDIRECTURI$" }, output={ "token_type": "Bearer" }, inputTemplate=esignet/OTPAuthFactorFlow/WithoutVerifiedClaims/GenToken/GenerateToken, outputTemplate=esignet/OTPAuthFactorFlow/WithoutVerifiedClaims/GenToken/GenerateTokenResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generate token with all valid details without Verified Claims, uniqueIdentifier=TC_ESignet_GenerateTokenWithoutVerifiedClaims_01, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| ESignet_GetOidcUserInfo_IdpAccessToken_StatusCode_Without_Verified_Claims_Valid_Smoke |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=ESignet_GetOidcUserInfo_IdpAccessToken_StatusCode_Without_Verified_Claims_Valid_Smoke, endPoint=/v1/esignet/oidc/userinfo, role=resident, templateFields=null, input={ "idpAccessToken": "$ID:GenerateToken_Without_Verified_Claims_Valid_Smoke_sid_access_token$" }, output=200, inputTemplate=esignet/OTPAuthFactorFlow/WithoutVerifiedClaims/Userinfo/GetOidcUserInfo, outputTemplate=esignet/OTPAuthFactorFlow/WithoutVerifiedClaims/Userinfo/GetOidcUserInfoResult, restMethod=get, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Get OIDC user info without Verified Claims, uniqueIdentifier=TC_ESignet_GetOidcUserInfoWithoutVerifiedClaims_01, additionalDependencies=null |
| Messages |